Presentation 2011/7/5
Prevention using API hook against DEP Bypass
Hironori Kurihara, Takeshi Okamoto,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Internet users are prone to various vulnerable services and tools that automatically generate attack codes posing serious problems for computer security. One security feature intended to prevent such problems is DEP (Data Execution Prevention) implemented by Microsoft. DEP prevents executions of code from the data region of memory. Unfortunately, a DEP bypass method has recently been revealed, which means a decrease in the security level of Windows OS. In this paper we propose a method for prevention of DEP bypass, using API hooks. We tested the method and evaluated its effectiveness
Keyword(in Japanese) (See Japanese page)
Keyword(in English)
Paper #
Date of Issue

Conference Information
Committee SITE
Conference Date 2011/7/5(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Social Implications of Technology and Information Ethics (SITE)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Prevention using API hook against DEP Bypass
Sub Title (in English)
Keyword(1)
1st Author's Name Hironori Kurihara
1st Author's Affiliation Graduate School of Science Engineering, Kanagawa Institute of Technology()
2nd Author's Name Takeshi Okamoto
2nd Author's Affiliation Graduate School of Science Engineering, Kanagawa Institute of Technology
Date 2011/7/5
Paper #
Volume (vol) vol.111
Number (no) 124
Page pp.pp.-
#Pages 8
Date of Issue