Abstract | ||
---|---|---|
A Buffer Overflow (BOF) continues to be among the top open doors to worms and malware. Earlier in 2014, the security world was taken by surprise when researches unveiled a BOF in OpenSSL. Languages like C and C++, widely used for system development and for a large variety of applications, do not provide native Array-Bound Checks (ABC). A myriad of proposals endeavor memory protection for such languages by employing both software-and hardware-based solutions. Due to numerous reasons, none of them have yet reached the mainstream. In this work we propose a novel approach to achieve an array bound-check and a memory access (when allowed) within a single instruction. We discuss how it can be implemented on variable-length ISAs and provide a reference implementation. Our results indicate that our solution can run programs 1,79x faster than the software-based approach. |
Year | Venue | Field |
---|---|---|
2016 | 2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC) | Memory protection,Computer science,Reference implementation,Software,System development,Surprise,Malware,Operating system,Buffer overflow,Doors |
DocType | Citations | PageRank |
Conference | 0 | 0.34 |
References | Authors | |
22 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Antonio Maia | 1 | 0 | 0.34 |
Leandro Melo | 2 | 1 | 1.03 |
Fernando Magno Quintão Pereira | 3 | 216 | 20.03 |
Omar P. Vilela Neto | 4 | 58 | 11.12 |
Leonardo B. Oliveira | 5 | 554 | 30.22 |