The Cost of Preventing a Buffer Overflow

被引:0
|
作者
Gordonov, Anatoliy S.
机构
关键词
buffer overflows; mitigation strategies; memory consumption;
D O I
暂无
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
In the paper we have considered the main methods of buffer overflows, mitigation strategies, and their influence on the memory consumption. The analysis of various methods of stack protection has given us an estimate of the additional memory required for the implementation of specific techniques. The size of the additional memory depends on many factors including computer architecture, OS environment, programming languages used to create the program. For the protection methods considered in the paper, the cost may vary from the insignificant amount for prevention purposes, based on the careful analysis of input data in the program, to the use of Guard Pages when extra memory may include additional pages of the memory. In many cases developers have to use various mitigation strategies in order to make programs less vulnerable to buffer overflows. The main contribution of this paper is the analysis and evaluation of the additional memory required for the various methods of protection from buffer overflow. The current paper allows readers to understand the cost of these methods more clearly, which, in turn, will result in more efficient and secure programs. The results of this paper are useful for both software developers and the instructors who teach methods of secure programming.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] BUFFER OVERFLOW
    Spruth, W. G.
    COMPUTER, 2012, 45 (08) : 7 - 7
  • [2] Buffer overflow and format string overflow vulnerabilities
    Lhee, KS
    Chapin, SJ
    SOFTWARE-PRACTICE & EXPERIENCE, 2003, 33 (05): : 423 - 460
  • [3] Reliable Packet Flow Control for Preventing Buffer Overflow in Wi-Fi Serial Bus
    Jung, Woo-Sung
    Lim, Keun-Woo
    Ko, Young-Bae
    IEEE COMMUNICATIONS LETTERS, 2015, 19 (06) : 1009 - 1012
  • [4] Method of integer overflow detection to avoid buffer overflow
    School of Computer Science and Engineering, Southeast University, Nanjing 211189, China
    不详
    J. Southeast Univ. Engl. Ed., 2009, 2 (219-223):
  • [5] A Taxonomy of Buffer Overflow Characteristics
    Bishop, Matt
    Engle, Sophie
    Howard, Damien
    Whalen, Sean
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (03) : 305 - 317
  • [6] Vulnerability scanning for buffer overflow
    Iyer, A
    Liebrock, LM
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 116 - 117
  • [7] Buffer-overflow protection: The theory
    Piromsopa, Krerk
    Enbody, Richard J.
    2006 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2006, : 454 - 458
  • [8] New mechanism for buffer overflow prevention
    Li, Cheng-Hung
    Luo, Chi-Wei
    Leu, Show-Wei
    Jan, Gene Eu
    IMECS 2006: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, 2006, : 481 - 486
  • [9] The Principle and Prevention of Windows Buffer Overflow
    Liu Feifei
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1285 - 1288
  • [10] Classification of Buffer Overflow Vulnerability Monitors
    Shahriar, Hossain
    Zulkernine, Mohammad
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 519 - 524