• DocumentCode
    3668874
  • Title

    Toward preventing stack overflow using kernel properties

  • Author

    Benjamin Teissier;Stefan D. Bruda

  • Author_Institution
    Department of Computer Science, Bishop´s University, 2600 College St, Sherbrooke, Quebec J1M 1Z7, Canada
  • fYear
    2014
  • Firstpage
    369
  • Lastpage
    376
  • Abstract
    We contribute to the investigation of buffer overflows by finding a more accurate way of preventing their exploitation. We work at the highest privilege levels and in the safest part of a GNU/Linux system, namely the kernel. We provide a system that allows the kernel to detect overflows and prevent their exploitation. The kernel injects at launch time some (minimal) code into the binary being run, and subsequently uses this code to monitor the execution of that program with respect to its stack use, thus detecting stack overflows. The system stands alone in the sense that it does not need any hardware support; it also works on any program, no matter how that program was conceived or compiled. Beside the theoretical concepts we also present a proof-of-concept patch to the kernel supporting our idea. Overall we effectively show that guarding against buffer overflows at run time is not only possible but also feasible. In addition we take the first steps toward implementing such a defense.
  • Keywords
    "Kernel","Linux","Probes","Computers","Hardware","Arrays"
  • Publisher
    ieee
  • Conference_Titel
    Software Engineering and Applications (ICSOFT-EA), 2014 9th International Conference on
  • Type

    conf

  • Filename
    7293885