Buffer overflow protection based on segment limitation

Zhigang Cui*, Yu'an Tan, Yuanda Cao, Xuelan Zhang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

A non-executable stack approach is proposed and evaluated to defense against stack-based buffer overflow attacks under Windows and Intel 32-bit CPUs. A kernel device driver is designed to relocate the application's user-mode stack to the higher address and to modify the effective limit in the code segment descriptor, so the relocated stack is excluded from the code segment. Once any malicious code that attempts to execute in the stack, a general-protection exception is triggered, then the malicious code will be terminated. It is highly effective in preventing both known and yet unknown stack smashing attacks, and its performance overhead is lower than the page-based non-executable stack approach.

Original languageEnglish
Pages (from-to)140-142
Number of pages3
JournalJisuanji Gongcheng/Computer Engineering
Volume32
Issue number10
Publication statusPublished - 20 May 2006

Keywords

  • Buffer overflow attack
  • Computer security
  • Kernel device driver

Fingerprint

Dive into the research topics of 'Buffer overflow protection based on segment limitation'. Together they form a unique fingerprint.

Cite this