Title :
StackLock with simple FSM
Author :
Ahn, Dongkyun ; Lee, Gyungho
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Illinois at Chicago, Chicago, IL, USA
Abstract :
With a wide spread of malicious software attacks, run-time stack has been drawing attention because it is one of the most vulnerable points in computer architecture. Conventional stack layout, in which local variables for user input and control flow data such as return address are saved close to each other, is often the root of the attack vulnerability. This paper proposes a simple finite state machine to track usage of stack frame locations at a fine granularity of 2-bytes. Such a fine grain protection is necessary to distinguish adjacent stack frame locations, which allows detecting abnormal memory operations even in real mode running of a boot loader. The proposed scheme guarantees 2-byte granularity for preventing malicious writes in the stack using small additional memory space for the finite state machine.
Keywords :
finite state machines; security of data; abnormal memory detection; adjacent stack frame location; boot loader; computer architecture; conventional stack layout; fine grain protection; finite state machine; flow data control; Automata; Buffer overflow; Computer architecture; Data security; Engineering drawings; Hardware; Keyboards; Monitoring; Protection; Runtime;
Conference_Titel :
Electro/Information Technology, 2009. eit '09. IEEE International Conference on
Conference_Location :
Windsor, ON
Print_ISBN :
978-1-4244-3354-4
Electronic_ISBN :
978-1-4244-3355-1
DOI :
10.1109/EIT.2009.5189582