2010
DOI: 10.1007/978-3-642-17714-9_12
|View full text |Cite
|
Sign up to set email alerts
|

ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows

Abstract: Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are getting increasingly harder for attackers to successfully exploit due to numerous countermeasures that are deployed by modern operating systems. We believe that this fact will drive exploit writers away from classic control-data attacks and towards data-only attacks. In data-only attacks, the attacker changes key data structures that are… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…StackGuard is a compiler extension that offers protection against overwriting of return address using canaries. ValueGuard extends the use of canaries to all variables through a source-to-source transformation [3]. All data items are replaced with a pointer to a combination of an equivalent data item and a canary.…”
Section: Prior Workmentioning
confidence: 99%
“…StackGuard is a compiler extension that offers protection against overwriting of return address using canaries. ValueGuard extends the use of canaries to all variables through a source-to-source transformation [3]. All data items are replaced with a pointer to a combination of an equivalent data item and a canary.…”
Section: Prior Workmentioning
confidence: 99%
“…Unfortunately this meant that an attacker could still perform a successful heap-based buffer overflow as long as a sensitive value in the overflowed object was used before the object was deallocated. Van Acker et al [37] wrap all variables in canary-protected structures, but require access to source code and incur a significant overhead.…”
Section: Canary-based Approachesmentioning
confidence: 99%
“…ProPolice-like countermeasures are widely used in modern operating systems. Variations of the canary-principle have also been proposed to protect a program's heap [24,37] and individual program variables [31].…”
Section: More Defensive Execution Of Unsafe Languagesmentioning
confidence: 99%