Efficient array & pointer bound checking against buffer overflow attacks via hardware/software

被引:0
|
作者
Shao, ZL [1 ]
Xue, C [1 ]
Zhuge, QF [1 ]
Sha, EHM [1 ]
Xiao, B [1 ]
机构
[1] Univ Texas, Dept Comp Sci, Richardson, TX 75083 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Buffer overflow attacks cause serious security problems. Array & pointer bound checking is one of the most effective approaches for defending against buffer overflow attacks when source code is available. However, original array & pointer bound checking causes too much overhead since it is designed to catch memory errors and it puts too many checks. In this paper, we propose an efficient array & pointer bound checking strategy to defend against buffer overflow attacks. In our strategy, only the bounds of write operations are checked. We discuss the optimization strategy via hardware/software and conduct experiments. The experimental results show that our strategy can greatly reduce the overhead of array & pointer bound checking. Our conclusion is that based on our strategy, array & pointer bound checking can be a practical solution for defending systems against buffer overflow attacks with tolerable overhead.
引用
收藏
页码:780 / 785
页数:6
相关论文
共 50 条
  • [1] Hardware/software optimization for array & pointer boundary checking against buffer overflow attacks
    Shao, Zili
    Cao, Jiannong
    Chan, Keith C. C.
    Xue, Chun
    Sha, Edwin H. -M.
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (09) : 1129 - 1136
  • [2] Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
    Shao, ZL
    Xue, C
    Zhuge, QF
    Qiu, MK
    Xiao, B
    Sha, EHM
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (04) : 443 - 453
  • [3] An efficient pointer protection scheme to defend buffer overflow attacks
    Park, Yongsu
    Cho, Yookun
    [J]. APPLIED PARALLEL COMPUTING: STATE OF THE ART IN SCIENTIFIC COMPUTING, 2006, 3732 : 1025 - 1030
  • [4] Defending embedded systems against buffer overflow via Hardware/Software
    Shao, Z
    Zhuge, QF
    He, Y
    Sha, EHM
    [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 352 - 361
  • [5] An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks
    Sah, Love Kumar
    Islam, Sheikh Ariful
    Katkoori, Srinivas
    [J]. PROCEEDINGS OF THE 2018 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2018, : 1 - 6
  • [6] SegmentShield: Exploiting segmentation hardware for protecting against buffer overflow attacks
    Shinagawa, Takahiro
    [J]. SRDS 2006: 25TH IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2006, : 277 - 286
  • [7] Security protection and checking in embedded system integration against buffer overflow attacks
    Shao, ZL
    Xue, C
    Zhuge, QF
    Sha, EHM
    Xiao, B
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 409 - 413
  • [8] BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks
    Rao, Jinli
    He, Zhangqing
    Xu, Shu
    Dai, Kui
    Zou, Xuecheng
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (08): : 2002 - 2009
  • [9] FFRR: a software diversity technique for defending against buffer overflow attacks
    Kisore, N. Raghu
    Kumar, K. Shiva
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (1-2) : 40 - 74
  • [10] Hardware solution for detection and prevention of buffer overflow attacks
    Zhang, YH
    Wang, JB
    Xu, ZH
    Yan, XL
    Wang, LY
    [J]. 2003 5TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2003, : 1304 - 1307