Generation of Application Level Audit Data via Library Interposition
نویسندگان
چکیده
One difficulty encountered by intrusion and misuse detection systems is a lack of application level audit data. Frequently, applications used are written by third parties and may be distributed only in a binary format. In this paper we present a technique to generate application level audit data using library interposition. Interposition allows the generation of audit data without needing to recompile either the system libraries or the application of interest. We created a library that detects some types of unsafe programming practices, and discovered two unreported race conditions in common applications. A prototype interposition library that dynamically detects and prevents some forms of buffer overflow attacks is also introduced. This second prototype library was able to successfully detect and prevent several buffer overflow attacks against privileged programs.
منابع مشابه
Profiling and Tracing Dynamic Library Usage Via Interposition
Run-time resolution of library functions provides a rich and powerful opportunity to collect workload profiles and function/parameter trace information without source, special compilation, or special linking. This can be accomplished by having the linker resolve library functions to special wrapper functions that collect statistics before and after calling the real library function, leaving bot...
متن کاملTransparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation
Format-string attack is one of the few truly threats to software security. Many previous methods for addressing this problem rely on program source code analysis or special recompilation, and hence exhibit limitations when applied to protect the source code unavailable software. In this paper, we present a transparent run-time approach to the defense against format-string attacks via dynamic ta...
متن کاملFamiliarity and application of smart technologies on customer relationship management
Aim: The purpose of the study is to examine familiarity and application of smart technologies {Radio-frequency identification (RFID), Quick Response code(QR), Near-Field-Communication Mobile (NFC)} on customer relationship management (CRM). Methodology: An applied study collecting data via Stokić, Stojanović, Bogdanović, Despotović-Zrakić, Radenković questionnaire. Population consisted of 1...
متن کاملParrot: Transparent User-Level Middleware for Data-Intensive Computing
Distributed computing continues to be an alphabet-soup of services and protocols for managing computation and storage. To live in this environment, applications require middleware that can transparently adapt standard interfaces to new distributed systems; such software is known as an interposition agent. In this paper, we present several lessons learned about interposition agents via a progres...
متن کاملParrot: an Application Environment for Data-intensive Computing ((preprint Version))
Distributed computing continues to be an alphabet-soup of services and protocols for managing computation and storage. To live in this environment, applications require middleware that can transparently adapt standard interfaces to new distributed systems; such middleware is known as an interposition agent. In this paper, we present several lessons learned about interposition agents via a progr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999