• DocumentCode
    3063387
  • Title

    A Segment-based Approach of Defending Against Buffer Overflow Attacks

  • Author

    Tan, Yu-An ; Zheng, Ji-Yan ; Cao, Yuan-Da

  • Author_Institution
    Beijing Institute of Technology, China
  • fYear
    2005
  • fDate
    05-08 Dec. 2005
  • Firstpage
    430
  • Lastpage
    433
  • Abstract
    Buffer overflows remain the leading cause of software vulnerabilities in the world of information security. The proposed segment-based non-executable stack approach aims to prevent the injection and execution of arbitrary code in an existing process´s stack space under Windows NT/2000 and Intel 32-bit CPUs. The application´s user-mode stack is relocated to the higher address and the effective limit of the code segment excludes the relocated stack from the code segment. The segmentation logic of IA-32 processors monitors the accesses to the memory ranges and a page fault is generated if instruction fetches are initiated in the stack memory pages. It is highly effective in preventing both known and yet unknown stack smashing attacks.
  • Keywords
    Buffer overflow; Computer science; Explosives; Information security; Internet; Kernel; Libraries; Logic; Protection; Space technology;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Parallel and Distributed Computing, Applications and Technologies, 2005. PDCAT 2005. Sixth International Conference on
  • Print_ISBN
    0-7695-2405-2
  • Type

    conf

  • DOI
    10.1109/PDCAT.2005.47
  • Filename
    1578951