Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • chapterNo Access

    Instruction set randomization based on compilation

    Injection attack is still a serious form of threat to system security. This paper presents an instruction randomization technique based on compilation to effectively prevent code injection attacks. We analyze instruction format and create rules to replace or recover instructions. During compilation, our methods transform instructions according to the random replacement rules and generate the protected target programs. When executing, the protected program is recovered on a runtime code manipulation system in accordance with recovery rules. Results show that our method can correctly capture instructions and effectively thwart injection attacks while introducing an extra runtime overhead of 33% on average compared with execution without protection on the runtime code manipulation system.