SegmentShield: Exploiting segmentation hardware for protecting against buffer overflow attacks

被引:0
|
作者
Shinagawa, Takahiro [1 ]
机构
[1] Tokyo Univ Agr & Technol, Div Syst Informat Sci, Tokyo, Japan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a strong and efficient scheme for protecting against buffer overflow attacks. The basic approach of this scheme is pointer copying: copies of code pointers are stored in a safe memory area to detect and prevent the manipulation of code pointers. In order to protect the copied code pointers from data-pointer modification attacks, this scheme exploits the segmentation hardware of IA-32 (Intel x86) processors. This scheme provides as strong protection as write-protecting the memory area via system calls. On the other hand, this scheme involves a modest overhead because copying a code pointer requires only a few user-level instructions and there is no penalty of entering the kernel. The experimental results show that the performance overhead in OpenSSL ranges from 0.9% to 4.3%.
引用
收藏
页码:277 / 286
页数:10
相关论文
共 50 条
  • [41] Simulation of a secure CPU with SecureTag technique to defend embedded systems against buffer overflow attacks
    Grasser, Michael Georg
    Priebsch, Johannes
    Hofer, Georg
    Hodanek, Thomas
    2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 484 - +
  • [42] Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory
    Guan, Le
    Lin, Jingqiang
    Luo, Bo
    Jing, Jiwu
    Wang, Jing
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 3 - 19
  • [43] Secure bit: Transparent, hardware buffer-overflow protection
    Piromsopa, Krerk
    Enbody, Richard J.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (04) : 365 - 376
  • [44] Experiments with deceptive software responses to buffer-overflow attacks
    Julian, MAJDP
    Rowe, NC
    Michael, JB
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 43 - 44
  • [45] Embedded TaintTracker: Lightweight Run-Time Tracking of Taint Data against Buffer Overflow Attacks
    Lai, Yuan-Cheng
    Lin, Ying-Dar
    Wu, Fan-Cheng
    Huang, Tze-Yau
    Lin, Frank C.
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2129 - 2138
  • [46] A New Data Randomization Method to Defend Buffer Overflow Attacks
    Yan Fen
    Yuan Fuchao
    Shen Xiaobing
    Yin Xinchun
    Mao Bing
    INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT C, 2012, 24 : 1757 - 1764
  • [47] A New Data Randomization Method to Defend Buffer Overflow Attacks
    Yan Fen
    Yuan Fuchao
    Shen Xiaobing
    Yin Xinchun
    Bing, Mao
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 466 - 469
  • [48] A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device
    Xu, Bin
    Wang, Weike
    Hao, Qiang
    Zhang, Zhun
    Du, Pei
    Xia, Tongsheng
    Li, Hongge
    Wang, Xiang
    IEEE ACCESS, 2018, 6 : 72862 - 72869
  • [49] RAD: A compile-time solution to buffer overflow attacks
    Chiueh, TC
    Hsu, FH
    21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 409 - 417
  • [50] An efficient pointer protection scheme to defend buffer overflow attacks
    Park, Yongsu
    Cho, Yookun
    APPLIED PARALLEL COMPUTING: STATE OF THE ART IN SCIENTIFIC COMPUTING, 2006, 3732 : 1025 - 1030