کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
454699 | 695276 | 2015 | 8 صفحه PDF | دانلود رایگان |
• Design a method to protect the return address stack from stack smashing attacks.
• Our approach does not need source code and hardware support.
• Relative performance overhead is only between 3.47% and 8.59%.
Stack smashing is one of the most popular techniques for hijacking program controls. Various techniques have been proposed, but most techniques need to alter compilers or require hardware support, and only few of them are developed for Windows. In this paper, we design a Secure Return Address Stack to defeat stack smashing attacks on Windows. Our approach does not need source code and hardware support. We also extend our approach to instrument a DLL, a multi-thread application, and DLLs used by multi-thread applications. Benchmark GnuWin32 shows that the relative performance overhead of our approach is only between 3.47% and 8.59%.
Journal: Computer Standards & Interfaces - Volume 38, February 2015, Pages 17–24