SegmentShield: Exploiting segmentation hardware for protecting against buffer overflow attacks

被引:0
|
作者
Shinagawa, Takahiro [1 ]
机构
[1] Tokyo Univ Agr & Technol, Div Syst Informat Sci, Tokyo, Japan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a strong and efficient scheme for protecting against buffer overflow attacks. The basic approach of this scheme is pointer copying: copies of code pointers are stored in a safe memory area to detect and prevent the manipulation of code pointers. In order to protect the copied code pointers from data-pointer modification attacks, this scheme exploits the segmentation hardware of IA-32 (Intel x86) processors. This scheme provides as strong protection as write-protecting the memory area via system calls. On the other hand, this scheme involves a modest overhead because copying a code pointer requires only a few user-level instructions and there is no penalty of entering the kernel. The experimental results show that the performance overhead in OpenSSL ranges from 0.9% to 4.3%.
引用
收藏
页码:277 / 286
页数:10
相关论文
共 50 条
  • [1] Hardware solution for detection and prevention of buffer overflow attacks
    Zhang, YH
    Wang, JB
    Xu, ZH
    Yan, XL
    Wang, LY
    2003 5TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2003, : 1304 - 1307
  • [2] Hardware/software optimization for array & pointer boundary checking against buffer overflow attacks
    Shao, Zili
    Cao, Jiannong
    Chan, Keith C. C.
    Xue, Chun
    Sha, Edwin H. -M.
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (09) : 1129 - 1136
  • [3] Protecting global and static variables from buffer overflow attacks
    Younan, Yves
    Piessens, Frank
    Joosen, Wouter
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 798 - 803
  • [4] Efficient array & pointer bound checking against buffer overflow attacks via hardware/software
    Shao, ZL
    Xue, C
    Zhuge, QF
    Sha, EHM
    Xiao, B
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 780 - 785
  • [5] Stack Overflow Fence: A Technique for Defending Against Buffer Overflow Attacks
    Madan, Bharat B.
    Phoha, Shashi
    Trivedi, Kishor S.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (02): : 129 - 136
  • [6] StackOFFence: A technique for defending against buffer overflow attacks
    Madan, BB
    Phoha, S
    Trivedi, KS
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 656 - 661
  • [7] A hybrid method of defense against buffer overflow attacks
    Dasari, Annapurna
    Dasgupta, Partha
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 195 - 200
  • [8] A processor architecture Defense against buffer overflow attacks
    McGregor, JP
    Karig, DK
    Shi, ZJ
    Lee, RB
    ITRE2003: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, 2003, : 243 - 250
  • [9] Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
    Shao, ZL
    Xue, C
    Zhuge, QF
    Qiu, MK
    Xiao, B
    Sha, EHM
    IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (04) : 443 - 453
  • [10] Defending embedded systems against buffer overflow via Hardware/Software
    Shao, Z
    Zhuge, QF
    He, Y
    Sha, EHM
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 352 - 361