Mitigating Vulnerabilities in Closed Source Software

نویسندگان

چکیده

Many techniques have been proposed to harden programs with protection mechanisms defend against vulnerability exploits. Unfortunately the vast majority of them cannot be applied closed source software because they require access program code. This paper presents our work on automatically hardening binary code security workarounds, a mechanism that prevents vulnerabilities from being triggered by disabling vulnerable By working solely code, approach is applicable software. To synthesize we develop analysis identify existing error handling in workarounds form and instrument into programs. We designed implemented prototype or for Windows Linux Our evaluation shows can apply an average 69.3% successfully exploits trigger real-world vulnerabilities.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities

Reviewing literature on open source and closed source security reveals that the discussion is often determined by biased attitudes toward one of these development styles. The discussion specifically lacks appropriate metrics, methodology and hard data. This paper contributes to solving this problem by analyzing and comparing published vulnerabilities of eight open source software and nine close...

متن کامل

Security of open source and closed source software: An empirical comparison of published vulnerabilities

Reviewing literature on open source and closed source security reveals that the discussion is often determined by biased attitudes toward one of these development styles. The discussion specifically lacks appropriate metrics, methodology and hard data. This paper contributes to solving this problem by analyzing and comparing published vulnerabilities of eight open source software and nine close...

متن کامل

Software Vulnerabilities: Open Source versus Proprietary Software Security

This study seeks to empirically investigate specific security characteristics of both open source software and proprietary software. Operating system software vulnerability data spanning several years are collected and analyzed to determine if significant differences exist in terms of inter-arrival times of published vulnerabilities and patch releases. Open source software is only marginally qu...

متن کامل

Mitigating and Monitoring Program Security Vulnerabilities

Today's programs are implemented in a variety of languages and contain serious vulnerabilities which can be exploited to cause security breaches. These vulnerabilities have been exploited in real life and resulted in damages to related stakeholders such as program users. As most vulnerabilities belong to program code, many techniques have been applied to mitigate vulnerabilities before and afte...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: EAI Endorsed Transactions on Security and Safety

سال: 2022

ISSN: ['2032-9393']

DOI: https://doi.org/10.4108/eetss.v8i30.253