DocumentCode
2746928
Title
StackLock with simple FSM
Author
Ahn, Dongkyun ; Lee, Gyungho
Author_Institution
Dept. of Electr. & Comput. Eng., Univ. of Illinois at Chicago, Chicago, IL, USA
fYear
2009
fDate
7-9 June 2009
Firstpage
46
Lastpage
51
Abstract
With a wide spread of malicious software attacks, run-time stack has been drawing attention because it is one of the most vulnerable points in computer architecture. Conventional stack layout, in which local variables for user input and control flow data such as return address are saved close to each other, is often the root of the attack vulnerability. This paper proposes a simple finite state machine to track usage of stack frame locations at a fine granularity of 2-bytes. Such a fine grain protection is necessary to distinguish adjacent stack frame locations, which allows detecting abnormal memory operations even in real mode running of a boot loader. The proposed scheme guarantees 2-byte granularity for preventing malicious writes in the stack using small additional memory space for the finite state machine.
Keywords
finite state machines; security of data; abnormal memory detection; adjacent stack frame location; boot loader; computer architecture; conventional stack layout; fine grain protection; finite state machine; flow data control; Automata; Buffer overflow; Computer architecture; Data security; Engineering drawings; Hardware; Keyboards; Monitoring; Protection; Runtime;
fLanguage
English
Publisher
ieee
Conference_Titel
Electro/Information Technology, 2009. eit '09. IEEE International Conference on
Conference_Location
Windsor, ON
Print_ISBN
978-1-4244-3354-4
Electronic_ISBN
978-1-4244-3355-1
Type
conf
DOI
10.1109/EIT.2009.5189582
Filename
5189582
Link To Document