2007
DOI: 10.1109/icact.2007.358715
|View full text |Cite
|
Sign up to set email alerts
|

The Dynamic Buffer Overflow Detection and Prevent ion Tool for Yindows Executables Using Binary Rewr iting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(13 citation statements)
references
References 2 publications
0
13
0
Order By: Relevance
“…A contigu- ous stack buffer overflow would overwrite the stack canary, which is checked for intactness before the RETs of vulnerable functions [50]. Shadow stacks are sometimes argued to be a type of stack canary: instead of checking whether an added canary value has been corrupted, the return addresses (and sometimes the saved frame pointers) are used as canaries [8,39]. For completeness, we investigated the overhead of stack canaries.…”
Section: Stack Canariesmentioning
confidence: 99%
“…A contigu- ous stack buffer overflow would overwrite the stack canary, which is checked for intactness before the RETs of vulnerable functions [50]. Shadow stacks are sometimes argued to be a type of stack canary: instead of checking whether an added canary value has been corrupted, the return addresses (and sometimes the saved frame pointers) are used as canaries [8,39]. For completeness, we investigated the overhead of stack canaries.…”
Section: Stack Canariesmentioning
confidence: 99%
“…Hence, we only focus on those techniques that use Binary Rewriting. We classify them into two groups according to the way they allocate return address stack: (1) static allocation [26,23] and (2) dynamic allocation [25,2]. The first group statically allocates a return address stack like adding a new section called return address stack into Portable Executable (PE) or Executable and Linking Format (ELF) file.…”
Section: Introductionmentioning
confidence: 99%
“…There is a class of techniques [26,34,23,8,25,2,32] which creates a safe area to backup return addresses to prevent stack smashing attacks. The safe area is called private stack, canary stack, or return address repository, etc.…”
Section: Introductionmentioning
confidence: 99%
“…While these methods and tools are helpful in developing more secure programs, it is impossible to provide a full assurance that all buffer overflows vulnerabilities have been found because of C semantics features (Park et al, 2007). Moreover, such methods are useless when using legacy code and old libraries, which are common practice among software developers.…”
Section: Buffer Overflow Problemmentioning
confidence: 99%
“…However, if the attacker injects an arbitrary attack code in the executable stack area instead of 'A' and overwrite the return address by address of attack code, an attacker can redirect the execution flow of program to the attack code and may gain the control of the whole system. Defending against buffer overflow vulnerabilities and attacks can be classified into four basic approaches (Park et al, 2007): writing correct code, non-executable buffer, array bound checking, and code pointer integrity checking.…”
Section: Buffer Overflow Problemmentioning
confidence: 99%