You are here

Preventing Program Hijacking via Static and Dynamic Analyses

Award Information
Agency: Department of Defense
Branch: Navy
Contract: N00014-12-M-0241
Agency Tracking Number: O113-IA5-4051
Amount: $131,237.00
Phase: Phase I
Program: SBIR
Solicitation Topic Code: OSD11-IA5
Solicitation Number: 2011.3
Timeline
Solicitation Year: 2011
Award Year: 2012
Award Start Date (Proposal Award Date): 2012-05-06
Award End Date (Contract End Date): N/A
Small Business Information
2040 Tremont Rd
Charlottesville, VA -
United States
DUNS: 830972647
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Clark Coleman
 Research Scientist
 (434) 284-3002
 clc@zephyr-software.com
Business Contact
 Jack Davidson
Title: President
Phone: (434) 242-4280
Email: jwd@zephyr-software.com
Research Institution
 Stub
Abstract

Control flow hijacking occurs when an attacker overwrites a control-flow data item (e.g. return address or function pointer) to take control of the execution of a program. We propose to detect and prevent hijacking by using a low-overhead per-process dynamic run-time virtualization monitor, called an SDT (software dynamic translator) to make shadow copies of control-flow data items each time they are initialized or updated, and detect overwriting changes that occur between initialization and use. A static analyzer that operates on program binaries will help identify all control-data items, and reduce run-time overhead by identifying control-data items that are provably safe (not susceptible to overwriting between initialization and use). Remedial actions to be taken when attempted hijacking is detected will not be limited to program termination; program recovery techniques will be studied and designed.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government