SegmentShield: Exploiting segmentation hardware for protecting against buffer overflow attacks

被引:0
|
作者
Shinagawa, Takahiro [1 ]
机构
[1] Tokyo Univ Agr & Technol, Div Syst Informat Sci, Tokyo, Japan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a strong and efficient scheme for protecting against buffer overflow attacks. The basic approach of this scheme is pointer copying: copies of code pointers are stored in a safe memory area to detect and prevent the manipulation of code pointers. In order to protect the copied code pointers from data-pointer modification attacks, this scheme exploits the segmentation hardware of IA-32 (Intel x86) processors. This scheme provides as strong protection as write-protecting the memory area via system calls. On the other hand, this scheme involves a modest overhead because copying a code pointer requires only a few user-level instructions and there is no penalty of entering the kernel. The experimental results show that the performance overhead in OpenSSL ranges from 0.9% to 4.3%.
引用
收藏
页码:277 / 286
页数:10
相关论文
共 50 条
  • [21] Libsafe: Transparent system-wide protection against buffer overflow attacks
    Tsai, T
    Singh, N
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 541 - 541
  • [22] BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks
    Rao, Jinli
    He, Zhangqing
    Xu, Shu
    Dai, Kui
    Zou, Xuecheng
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (08): : 2002 - 2009
  • [23] Hardware/Software Mechanisms for Protecting an IDS Against Algorithmic Complexity Attacks
    Sreekar Shenoy, Govind
    Tubella, Jordi
    Gonzalez, Antonio
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1190 - 1196
  • [24] Protecting Cryptographic Hardware against Malicious Attacks by Nonlinear Robust Codes
    Tomashevich, Victor
    Neumeier, Yaara
    Kumar, Raghavan
    Keren, Osnat
    Polian, Ilia
    PROCEEDINGS OF THE 2014 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFTS), 2014, : 40 - 45
  • [25] Detection and prevention of stack buffer overflow attacks
    Kuperman, BA
    Brodley, CE
    Ozdoganoglu, H
    Vijaykumar, TN
    Jalote, A
    COMMUNICATIONS OF THE ACM, 2005, 48 (11) : 50 - 56
  • [26] Evolving buffer overflow attacks with detector feedback
    Kayacik, H. Gunes
    Heywood, Malcolm I.
    Zincir-Heywood, A. Nur
    APPLICATIONS OF EVOLUTIONARY COMPUTING, PROCEEDINGS, 2007, 4448 : 11 - +
  • [27] Defeating buffer overflow attacks via virtualization
    Tian, Donghai
    Xiong, Xi
    Hu, Changzhen
    Liu, Peng
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1940 - 1950
  • [28] Study on the Principle and Defense of Buffer Overflow Attacks
    Lin, Wang
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [29] New chips stop buffer overflow attacks
    Dailey, L
    COMPUTER, 2004, 37 (10) : 28 - 28
  • [30] An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks
    Sah, Love Kumar
    Islam, Sheikh Ariful
    Katkoori, Srinivas
    PROCEEDINGS OF THE 2018 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2018, : 1 - 6