IDEAS home Printed from https://ideas.repec.org/a/gam/jeners/v13y2020i6p1332-d331978.html
   My bibliography  Save this article

Lightweight and Seamless Memory Randomization for Mission-Critical Services in a Cloud Platform

Author

Listed:
  • Joobeom Yun

    (Department of Computer and Information Security, Sejong University, Seoul 05006, Korea
    Current address: Rm. #724, Daeyang AI center, Seoul 05006, Korea.)

  • Ki-Woong Park

    (Department of Computer and Information Security, Sejong University, Seoul 05006, Korea)

  • Dongyoung Koo

    (Department of Electronics and Information Engineering, Hansung University, Seoul 02876, Korea)

  • Youngjoo Shin

    (Department of Computer and Information Engineering, Kwangwoon University, Seoul 01897, Korea)

Abstract

Nowadays, various computing services are often hosted on cloud platforms for their availability and cost effectiveness. However, such services are frequently exposed to vulnerabilities. Therefore, many countermeasures have been invented to defend against software hacking. At the same time, more complicated attacking techniques have been created. Among them, code-reuse attacks are still an effective means of abusing software vulnerabilities. Although state-of-the-art address space layout randomization (ASLR) runtime-based solutions provide a robust way to mitigate code-reuse attacks, they have fundamental limitations; for example, the need for system modifications, and the need for recompiling source codes or restarting processes. These limitations are not appropriate for mission-critical services because a seamless operation is very important. In this paper, we propose a novel ASLR technique to provide memory rerandomization without interrupting the process execution. In addition, we describe its implementation and evaluate the results. In summary, our method provides a lightweight and seamless ASLR for critical service applications.

Suggested Citation

  • Joobeom Yun & Ki-Woong Park & Dongyoung Koo & Youngjoo Shin, 2020. "Lightweight and Seamless Memory Randomization for Mission-Critical Services in a Cloud Platform," Energies, MDPI, vol. 13(6), pages 1-15, March.
  • Handle: RePEc:gam:jeners:v:13:y:2020:i:6:p:1332-:d:331978
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1996-1073/13/6/1332/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1996-1073/13/6/1332/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:13:y:2020:i:6:p:1332-:d:331978. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.