A Static Recognition Mechanism For Indirect Call Based On Static Single Assignment

Shixiang Gao,Tao Zheng,Xun Zhan,XianPing Tao,Qiaoming Zhu,Junyuan Xie,Wenyang Bai
DOI: https://doi.org/10.1007/978-3-319-09265-2_12
2014-01-01
Abstract:By preventing attacks which exploit stack buffer overflow vulnerabilities, address space layout randomization is an effective way for embedded systems protection. However, ASLR will probably suffer exhaustive attacks because the pertinence is not strong. At present only coarse-grained randomization has been implemented because one of the key bottlenecks for fine-grained randomization is the dependencies between functions cannot be constructed completely due to indirect calls. As a result, we give a static inter-procedural backtracking recognition mechanism in this paper by using intermediate code analysis technologies to identify the destination addresses of indirect callings generated by function pointers.
What problem does this paper attempt to address?