کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
454699 695276 2015 8 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
An enhancement of return address stack for security
ترجمه فارسی عنوان
افزایش آدرس بازگشتی برای امنیت
کلمات کلیدی
پشته حمله فوق العاده، سرریز بافر، حمله فساد اشاره گر حافظه، پشته آدرس برگشت بازنویسی باینری
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی


• Design a method to protect the return address stack from stack smashing attacks.
• Our approach does not need source code and hardware support.
• Relative performance overhead is only between 3.47% and 8.59%.

Stack smashing is one of the most popular techniques for hijacking program controls. Various techniques have been proposed, but most techniques need to alter compilers or require hardware support, and only few of them are developed for Windows. In this paper, we design a Secure Return Address Stack to defeat stack smashing attacks on Windows. Our approach does not need source code and hardware support. We also extend our approach to instrument a DLL, a multi-thread application, and DLLs used by multi-thread applications. Benchmark GnuWin32 shows that the relative performance overhead of our approach is only between 3.47% and 8.59%.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computer Standards & Interfaces - Volume 38, February 2015, Pages 17–24
نویسندگان
, , , , ,