Rewrite to Reinforce: Rewriting the Binary to Apply Countermeasures against Fault Injection
Fault injection attacks can cause errors in software for malicious purposes. Oftentimes, vulnerable points of a program are detected after its development. It is therefore critical for the user of the program to be able to apply last-minute security assurance to the executable file without having ac...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Fault injection attacks can cause errors in software for malicious purposes.
Oftentimes, vulnerable points of a program are detected after its development.
It is therefore critical for the user of the program to be able to apply
last-minute security assurance to the executable file without having access to
the source code. In this work, we explore two methodologies based on binary
rewriting that aid in injecting countermeasures in the binary file. The first
approach injects countermeasures by reassembling the disassembly whereas the
second approach leverages a full translation to a high-level IR and lowering
that back to the target architecture. |
---|---|
DOI: | 10.48550/arxiv.2011.14067 |