Mitigating Vulnerabilities in Closed Source Software

Authors

DOI:

https://doi.org/10.4108/eetss.v8i30.253

Keywords:

Software vulnerability, vulnerability mitigation, program analysis, binary rewriting

Abstract

Many techniques have been proposed to harden programs with protection mechanisms to defend against vulnerability exploits. Unfortunately the vast majority of them cannot be applied to closed source software because they require access to program source code. This paper presents our work on automatically hardening binary code with security workarounds, a protection mechanism that prevents vulnerabilities from being triggered by disabling vulnerable code. By working solely with binary code, our approach is applicable to closed source software. To automatically synthesize security workarounds, we develop binary program analysis techniques to identify existing error handling code in binary code, synthesize security workarounds in the form of binary code, and instrument security workarounds into binary programs. We designed and implemented a prototype or our approach for Windows and Linux binary programs. Our evaluation shows that our approach can apply security workarounds to an average of 69.3% of program code and the security workarounds successfully prevents exploits to trigger real-world vulnerabilities.

Downloads

Published

04-08-2022

How to Cite

Huang, Z., Tan, G., & Yu, X. (2022). Mitigating Vulnerabilities in Closed Source Software. EAI Endorsed Transactions on Security and Safety, 8(30), e4. https://doi.org/10.4108/eetss.v8i30.253