2008 IFIP International Conference on Network and Parallel Computing 2008
DOI: 10.1109/npc.2008.49
|View full text |Cite
|
Sign up to set email alerts
|

Secure Bit Enhanced Canary: Hardware Enhanced Buffer-Overflow Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…A buffer-overflow attack can be described as an attack in which a buffer is overflowed beyond its bounds into another buffer with an intent to cause malicious behavior in a program [4,29,40].…”
Section: Background: Buffer-overflow Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…A buffer-overflow attack can be described as an attack in which a buffer is overflowed beyond its bounds into another buffer with an intent to cause malicious behavior in a program [4,29,40].…”
Section: Background: Buffer-overflow Attacksmentioning
confidence: 99%
“…The protection solutions in the table are as follows: Segmentation [25], Integer Analysis to Determine Buffer Overflow [39], STOBO [14], Type-Assisted Buffer Overflow Detection [19], C Range Error Detector (CRED) [32], Jump Pointer [36], Stack-Guard [7], MemGuard [7], PointGuard [6], Smash-Guard [6], Minezone RAD [37], Read-only RAD [37], Efficient Dynamic Taint Analysis Using Multicore Machines [3], HeapDefender [20], Secure Bit [27], and Secure Canary Word [29] [4]. For comparison, we also include our proposed solution, Boundary Bit, in this table.…”
Section: Summary Of Buffer-overflow Attack Typesmentioning
confidence: 99%
See 1 more Smart Citation
“…In general, hardware-based approaches, such as [7,5,30,17,8,4,30,31], have lower runtime and memory overhead than their software-based counterparts. However, one of the major disadvantage of the majority of hardware-based approaches is that they are difficult to deploy, usually require new hardware, new revision of existing hardware, or even custom hardware.…”
Section: Hardware-based Approachesmentioning
confidence: 99%