Presentation | 2011/7/5 Prevention using API hook against DEP Bypass Hironori Kurihara, Takeshi Okamoto, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Internet users are prone to various vulnerable services and tools that automatically generate attack codes posing serious problems for computer security. One security feature intended to prevent such problems is DEP (Data Execution Prevention) implemented by Microsoft. DEP prevents executions of code from the data region of memory. Unfortunately, a DEP bypass method has recently been revealed, which means a decrease in the security level of Windows OS. In this paper we propose a method for prevention of DEP bypass, using API hooks. We tested the method and evaluated its effectiveness |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | |
Paper # | |
Date of Issue |
Conference Information | |
Committee | SITE |
---|---|
Conference Date | 2011/7/5(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Social Implications of Technology and Information Ethics (SITE) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Prevention using API hook against DEP Bypass |
Sub Title (in English) | |
Keyword(1) | |
1st Author's Name | Hironori Kurihara |
1st Author's Affiliation | Graduate School of Science Engineering, Kanagawa Institute of Technology() |
2nd Author's Name | Takeshi Okamoto |
2nd Author's Affiliation | Graduate School of Science Engineering, Kanagawa Institute of Technology |
Date | 2011/7/5 |
Paper # | |
Volume (vol) | vol.111 |
Number (no) | 124 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |