379 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author오희국-
dc.date.accessioned2019-01-22T02:11:22Z-
dc.date.available2019-01-22T02:11:22Z-
dc.date.issued2018-09-
dc.identifier.citationIEEE ACCESS, v. 6, Page. 50488-50509en_US
dc.identifier.issn2169-3536-
dc.identifier.urihttps://ieeexplore.ieee.org/abstract/document/8454360-
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/81401-
dc.description.abstractBinary rewriting techniques are widely used in program vulnerability fixing, obfuscation, security-oriented transforming, and other purposes, such as binary profiling and optimization. Over the past decade, most binary instrumentation techniques have been studied on x86 architecture, specifically focusing on the challenges of instrumenting non-PIC. In contrast, ARM architecture has received little attention, and statically instrumenting PIC has not been studied in depth. In ARM, owing to its fixed-length instructions, addresses are frequently computed via multiple stages, making it difficult to handle all relative addresses, especially the relative address of base-plus-offset and base-plus-index addressing. In this paper, we present REPICA, a static binary instrumentation technique which can rewrite ARM binaries compiled in a position-independent fashion. REPICA can instrument at anywhere without symbolic information. With the aim of identifying and processing relative-addresses accurately, we designed a value-set analysis specialized for PIC of which the domain is in symbolic format. We also identified a new challenge for situations all relative addresses cannot be corrected in an optimized way and solved this problem efficiently by the stepwise correction of each relative address. We implemented a prototype of REPICA and experimented with approximately 1200 COTS binaries and SPECint2006 benchmarks. The experiment showed that all binaries rewritten by REPICA maintain relative addresses correctly with negligible execution and space overhead. Finally, we exhibit the effectiveness of REPICA by using it to implement a shadow stack.en_US
dc.description.sponsorshipThis work was supported in part by the Ministry of Science, ICT and Future Planning, Korea, through the Information Technology Research Center Support Program, Institute for Information and Communications Technology Promotion, under Grant IITP-2018-2014-0-00636 and in part by the National Research Foundation of Korea through the Korean Government, Ministry of Education, Science and Technology, under Grant NRF-2015R1D1A1A09058200.en_US
dc.language.isoen_USen_US
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCen_US
dc.subjectBinary instrumentationen_US
dc.subjectbinary rewritingen_US
dc.subjectPICen_US
dc.subjectposition independent codeen_US
dc.subjectreassemblyen_US
dc.titleREPICA: Rewriting Position Independent Code of ARMen_US
dc.typeArticleen_US
dc.relation.volume6-
dc.identifier.doi10.1109/ACCESS.2018.2868411-
dc.relation.page50488-50509-
dc.relation.journalIEEE ACCESS-
dc.contributor.googleauthorHa, D.-
dc.contributor.googleauthorJin, W.-
dc.contributor.googleauthorOh, H.-
dc.relation.code2018011916-
dc.sector.campusE-
dc.sector.daehakCOLLEGE OF COMPUTING[E]-
dc.sector.departmentDIVISION OF COMPUTER SCIENCE-
dc.identifier.pidhkoh-
Appears in Collections:
COLLEGE OF COMPUTING[E](소프트웨어융합대학) > COMPUTER SCIENCE(소프트웨어학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE