Efficient Buffer-Overflow Prevention Technique Using Binary Rewriting


The KIPS Transactions:PartC, Vol. 12, No. 3, pp. 323-330, Jun. 2005
10.3745/KIPSTC.2005.12.3.323,   PDF Download:

Abstract

Buffer overflow is one of the most prevalent and critical internet security vulnerabilities. Recently, various methods to prevent buffer overflow attacks have been investigated, but they are still difficult to apply to real applications due to their run-time overhead. This paper suggests an efficient rewrite method to prevent buffer-overflow attacks only with lower costs by generating a redundant copy of the return address in stack frame and comparing return address to copied return address. Not to be overwritten by the attack data, the new copy will have the lower address number than local buffers have. In addition, for a safer execution environment, every vulnerable function call is transformed during the rewriting procedure.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
Y. S. Kim and E. S. Cho, "Efficient Buffer-Overflow Prevention Technique Using Binary Rewriting," The KIPS Transactions:PartC, vol. 12, no. 3, pp. 323-330, 2005. DOI: 10.3745/KIPSTC.2005.12.3.323.

[ACM Style]
Yun Sam Kim and Eun Sun Cho. 2005. Efficient Buffer-Overflow Prevention Technique Using Binary Rewriting. The KIPS Transactions:PartC, 12, 3, (2005), 323-330. DOI: 10.3745/KIPSTC.2005.12.3.323.