• DocumentCode
    2746928
  • Title

    StackLock with simple FSM

  • Author

    Ahn, Dongkyun ; Lee, Gyungho

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Univ. of Illinois at Chicago, Chicago, IL, USA
  • fYear
    2009
  • fDate
    7-9 June 2009
  • Firstpage
    46
  • Lastpage
    51
  • Abstract
    With a wide spread of malicious software attacks, run-time stack has been drawing attention because it is one of the most vulnerable points in computer architecture. Conventional stack layout, in which local variables for user input and control flow data such as return address are saved close to each other, is often the root of the attack vulnerability. This paper proposes a simple finite state machine to track usage of stack frame locations at a fine granularity of 2-bytes. Such a fine grain protection is necessary to distinguish adjacent stack frame locations, which allows detecting abnormal memory operations even in real mode running of a boot loader. The proposed scheme guarantees 2-byte granularity for preventing malicious writes in the stack using small additional memory space for the finite state machine.
  • Keywords
    finite state machines; security of data; abnormal memory detection; adjacent stack frame location; boot loader; computer architecture; conventional stack layout; fine grain protection; finite state machine; flow data control; Automata; Buffer overflow; Computer architecture; Data security; Engineering drawings; Hardware; Keyboards; Monitoring; Protection; Runtime;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Electro/Information Technology, 2009. eit '09. IEEE International Conference on
  • Conference_Location
    Windsor, ON
  • Print_ISBN
    978-1-4244-3354-4
  • Electronic_ISBN
    978-1-4244-3355-1
  • Type

    conf

  • DOI
    10.1109/EIT.2009.5189582
  • Filename
    5189582