Buffer overflow protection based on segment limitation

Zhigang Cui*, Yu'an Tan, Yuanda Cao, Xuelan Zhang

*此作品的通讯作者

科研成果: 期刊稿件文章同行评审

摘要

A non-executable stack approach is proposed and evaluated to defense against stack-based buffer overflow attacks under Windows and Intel 32-bit CPUs. A kernel device driver is designed to relocate the application's user-mode stack to the higher address and to modify the effective limit in the code segment descriptor, so the relocated stack is excluded from the code segment. Once any malicious code that attempts to execute in the stack, a general-protection exception is triggered, then the malicious code will be terminated. It is highly effective in preventing both known and yet unknown stack smashing attacks, and its performance overhead is lower than the page-based non-executable stack approach.

源语言英语
页(从-至)140-142
页数3
期刊Jisuanji Gongcheng/Computer Engineering
32
10
出版状态已出版 - 20 5月 2006

指纹

探究 'Buffer overflow protection based on segment limitation' 的科研主题。它们共同构成独一无二的指纹。

引用此