Nytro Posted December 23, 2012 Report Posted December 23, 2012 Foreign Code Detection on theWindows/X86 PlatformSusanta Nanda Wei Li Lap-Chung Lam Tzi-cker Chiueh{susanta,weili,lclam,chiueh}@cs.sunysb.eduDepartment of Computer ScienceSUNY at Stony BrookStony Brook, NY 11794-4400AbstractAs new attacks againstWindows-based machines emergealmost on a daily basis, there is an increasing need to“lock down” individual users’ desktop machines in corporatecomputing environments. One particular way to lockdown a user computer is to guarantee that only authorizedbinary programs are allowed to run on that computer. Amajor advantage of this approach is that binaries downloadedwithout the user’s knowledge, such as spyware, adware,or code entering through buffer overflow attacks, cannever run on computers that are locked down this way. Thispaper presents the design, implementation and evaluationof FOOD, a foreign code detection system specifically forthe Windows/X86 platform, where foreign code is defined asany binary programs that do not go through an authorizedinstallation procedure. FOOD verifies the legitimacy of binaryimages involved in process creation and library loadingto ensure that only authorized binaries are used in theseoperations. In addition, FOOD checks the target addressof every indirect branch instruction in Windows binaries toprevent illegitimate control transfers to either dynamicallyinjected mobile code or pre-existing library functions thatare potentially damaging. Combined together, these techniquesstrictly prevent the execution of any foreign code.Experiments with a fully working FOOD prototype showthat it can indeed stop all spyware and buffer overflow attackswe tested, and its worst-case run-time performanceoverhead associated with foreign code detection is less than35%.Download:www.acsac.org/2006/papers/86.pdf Quote