Proceedings 2015 Network and Distributed System Security Symposium 2015
DOI: 10.14722/ndss.2015.23248
|View full text |Cite
|
Sign up to set email alerts
|

StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries

Abstract: StackArmor is a comprehensive protection technique for stack-based memory error vulnerabilities in binaries. It relies on binary analysis and rewriting strategies to drastically reduce the uniquely high spatial and temporal memory predictability of traditional call stack organizations. Unlike prior solutions, StackArmor can protect against arbitrary stack-based attacks, requires no access to the source code, and offers a policy-driven protection strategy that allows end users to tune the securityperformance tr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
49
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 70 publications
(49 citation statements)
references
References 54 publications
0
49
0
Order By: Relevance
“…MvArmor implements this novel technique for all the heap objects, by using the standard "compact" allocator in the leader and a custom "sparse" allocator in the followers. Extending such guarantees to all the other memory objects is, in principle, possible, but source-level information is generally necessary to accurately decouple stack [47] and data [48] objects-although binary-level approximations are at times possible [49].…”
Section: A Variant Generatormentioning
confidence: 99%
“…MvArmor implements this novel technique for all the heap objects, by using the standard "compact" allocator in the leader and a custom "sparse" allocator in the followers. Extending such guarantees to all the other memory objects is, in principle, possible, but source-level information is generally necessary to accurately decouple stack [47] and data [48] objects-although binary-level approximations are at times possible [49].…”
Section: A Variant Generatormentioning
confidence: 99%
“…Memory safety -various-[4]- [6], [13], [36], [45] Mostly source code () -see §VII-E CPI/CPS [31] Source code / [52] that solely aim at constraining indirect calls and jumps but not returns. As such, taken for itself, forward-edge CFI does not prevent ROP in any way.…”
Section: C++-aware Cfimentioning
confidence: 99%
“…Systems that provide forms of memory safety for C/C++ applications [4]- [6], [13], [31], [36], [45] can constitute strong defenses against control-flow hijacking attacks in general. As our adversary model explicitly foresees an initial memory corruption and information leak (see §III-B), we do not explore the defensive strengths of these systems in detail.…”
Section: E Memory Safetymentioning
confidence: 99%
See 1 more Smart Citation
“…This, however, comes with significant overhead and is impractical using software alone [2]. Because of this, many implementations have attempted to use coarse-grained CFI [11,31,41]. Coarse-grained CFI sacrifices the completeness of the control-flow graph to improve performance [14,18].…”
Section: Listing 1: Sample Instrumented Codementioning
confidence: 99%