2022
DOI: 10.1155/2022/7645210
|View full text |Cite
|
Sign up to set email alerts
|

IRePf: An Instruction Reorganization Virtual Platform for Kernel Stack Overflow Detection

Abstract: Stack overflow vulnerabilities are among the most common security issues. However, the existing stack overflow detection solutions only protect the return address and ignore the imbalance between function calls and returns in the system, which will lead to a higher false-positive rate. In this paper, we propose an instruction reorganization virtual platform technique for kernel stack overflow detection, named IRePf. It can dynamically monitor the kernel stack when the system is running through dynamic reorgani… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…To implement the stack jump mechanism, it is necessary to find dangerous functions derived from application code and libraries. The dangerous functions that have been discovered are indicated in various vulnerability libraries provided by National Vulnerability Database [1] and China National Vulnerability Database of Information Security [2] . Therefore, DID can identify the dangerous function contained in the source code based on the vulnerability library information.…”
Section: Stack Jumping Rulesmentioning
confidence: 99%
See 3 more Smart Citations
“…To implement the stack jump mechanism, it is necessary to find dangerous functions derived from application code and libraries. The dangerous functions that have been discovered are indicated in various vulnerability libraries provided by National Vulnerability Database [1] and China National Vulnerability Database of Information Security [2] . Therefore, DID can identify the dangerous function contained in the source code based on the vulnerability library information.…”
Section: Stack Jumping Rulesmentioning
confidence: 99%
“…If the dangerous function depends on the stack frame data of the calling function, it will access these data [1] https://nvd.nist.gov/ [2] https://www.cnnvd.org.cn/ during execution. When the dangerous function is being called, it uses the new rbp or new rsp to locate the stack data on the stack frame of the calling function.…”
Section: Stack Jumping Rulesmentioning
confidence: 99%
See 2 more Smart Citations