Secure Compilation to Modern Processors

被引:34
作者
Agten, Pieter [1 ]
Strackx, Raoul [1 ]
Jacobs, Bart [1 ]
Piessens, Frank [1 ]
机构
[1] Katholieke Univ Leuven, IBBT DistriNet, Louvain, Belgium
来源
2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF) | 2012年
关键词
software security; compilation; full abstraction; hypervisors; PROTECTION;
D O I
10.1109/CSF.2012.12
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a secure (fully abstract) compilation scheme to compile an object-based high-level language to low-level machine code. Full abstraction is achieved by relying on a fine-grained program counter-based memory access protection scheme, which is part of our low-level target language. We discuss why standard compilers fail to provide full abstraction and introduce enhancements needed to achieve this goal. We prove that our enhanced compilation scheme provides full abstraction from our high-level source language to our low-level target language. Lastly, we show by means of a prototype implementation that our low-level language with fine-grained memory access control can be realized efficiently on modern commodity platforms.
引用
收藏
页码:171 / 185
页数:15
相关论文
共 22 条
[1]  
Abadi M, 1998, LECT NOTES COMPUT SC, V1443, P868, DOI 10.1007/BFb0055109
[2]   On Protection by Layout Randomization [J].
Abadi, Martin ;
Plotkin, Gordon .
2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, :337-351
[3]   Control-Flow Integrity Principles, Implementations, and Applications [J].
Abadi, Martin ;
Budiu, Mihai ;
Erlingsson, Ulfar ;
Ligatti, Jay .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 13 (01)
[4]  
Agten P., 2012, 619 CW KU LEUV
[5]  
[Anonymous], 2009, PROC 2 EUROPEAN WORK
[6]  
[Anonymous], 2012, P NETW DISTR SYST SE
[7]  
Azab AM, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P375
[8]  
Erlingsson U, 2010, HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, P633, DOI 10.1007/978-3-642-04117-4_30
[9]   Local Memory via Layout Randomization [J].
Jagadeesan, Radha ;
Pitcher, Corin ;
Rathke, Julian ;
Riely, James .
2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, :161-174
[10]  
Jeffrey A, 2005, LECT NOTES COMPUT SC, V3444, P423