DocumentCode
3668874
Title
Toward preventing stack overflow using kernel properties
Author
Benjamin Teissier;Stefan D. Bruda
Author_Institution
Department of Computer Science, Bishop´s University, 2600 College St, Sherbrooke, Quebec J1M 1Z7, Canada
fYear
2014
Firstpage
369
Lastpage
376
Abstract
We contribute to the investigation of buffer overflows by finding a more accurate way of preventing their exploitation. We work at the highest privilege levels and in the safest part of a GNU/Linux system, namely the kernel. We provide a system that allows the kernel to detect overflows and prevent their exploitation. The kernel injects at launch time some (minimal) code into the binary being run, and subsequently uses this code to monitor the execution of that program with respect to its stack use, thus detecting stack overflows. The system stands alone in the sense that it does not need any hardware support; it also works on any program, no matter how that program was conceived or compiled. Beside the theoretical concepts we also present a proof-of-concept patch to the kernel supporting our idea. Overall we effectively show that guarding against buffer overflows at run time is not only possible but also feasible. In addition we take the first steps toward implementing such a defense.
Keywords
"Kernel","Linux","Probes","Computers","Hardware","Arrays"
Publisher
ieee
Conference_Titel
Software Engineering and Applications (ICSOFT-EA), 2014 9th International Conference on
Type
conf
Filename
7293885
Link To Document