Abstract | ||
---|---|---|
This paper presents two schemes for detecting buffer overflow attacks at run-time. One is sensor embedding, which hides sensor data objects inside code pointers, and the other, stack frame inversion checking, which detects attacks by inspecting processor registers. Our methods make it difficult for attackers to guess the locations of sensors so that they cannot easily bypass sensors when they attempt to access code pointers. We have implemented the schemes by extending the GCC toolchain. Experimental data shows that our schemes provide programs with powerful detection and protection capabilities at the reasonable sacrifice of execution efficiency. Operating systems would improve on the defense against buffer overflow attacks by using our toolchain when they are built. |
Year | DOI | Venue |
---|---|---|
2004 | 10.1109/ITCC.2004.1286425 | ITCC (1) |
Keywords | Field | DocType |
buffer overflow attacks,gcc toolchain,sensor data objects,operating systems,powerful detectionand protection capability,sensor embedding,buffer storage,storage allocation,operating systems (computers),code pointer,explicit sensor data objects,experimental data,stack frame inversion checking,bufferoverflow attack,hides sensor data object,attemptto access code pointer,access code pointers,processor register inspection,frame inversion checking,buffer overflow attack,run-time detection,sensor fusion,system monitoring,security of data,internet,power system protection,national security,buffer overflow,registers,operating system | Pointer (computer programming),Object detection,Computer science,Call stack,Real-time computing,Sensor fusion,Power-system protection,Processor register,Toolchain,Buffer overflow,Embedded system | Conference |
Volume | ISBN | Citations |
1 | 0-7695-2108-8 | 6 |
PageRank | References | Authors |
0.41 | 5 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chang-Woo Pyo | 1 | 47 | 8.24 |
Byungchul Bae | 2 | 14 | 2.34 |
Tae-jin Kim | 3 | 111 | 21.38 |
gyungho lee | 4 | 265 | 33.24 |