Improving Compiler to Prevent Buffer Overflow Attack


The KIPS Transactions:PartC, Vol. 9, No. 4, pp. 453-458, Aug. 2002
10.3745/KIPSTC.2002.9.4.453,   PDF Download:

Abstract

Recently, the number of hacking, that use buffer overflow vulnerabilities, are increasing. Although the buffer overflow problem has been known for a long time, for the following reasons, it continues to present a serious security threat. There are three defense method of buffer overflow attack. First, allow overwrite but do not allow unauthorized change of control flow. Second, do not allow overwriting at all. Third, allow change of control flow, but prevents execution of injected code. This paper is for allowing overwrites but do not allow unauthorized change of control flow which is the solution of extending compiler. The previous defense method has two defects. First, a program company with overhead because it do much thing before than applying for the method in execution of process. Second, each time function returns, it store return address in reserved memory created by compiler. This cause waste of memory too much. The new proposed method is to extend compiler, by processing after compiling and linking time. To complement these defects, we can reduce things to do in execution time. By processing additional steps after compile/linking time and before execution time. We can reduce overhead.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. E. Kim, S. U. Lee, M. P. Hong, "Improving Compiler to Prevent Buffer Overflow Attack," The KIPS Transactions:PartC, vol. 9, no. 4, pp. 453-458, 2002. DOI: 10.3745/KIPSTC.2002.9.4.453.

[ACM Style]
Jong Ewi Kim, Seong Uck Lee, and Man Pyo Hong. 2002. Improving Compiler to Prevent Buffer Overflow Attack. The KIPS Transactions:PartC, 9, 4, (2002), 453-458. DOI: 10.3745/KIPSTC.2002.9.4.453.