The Cost of Preventing a Buffer Overflow

被引:0
|
作者
Gordonov, Anatoliy S.
机构
关键词
buffer overflows; mitigation strategies; memory consumption;
D O I
暂无
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
In the paper we have considered the main methods of buffer overflows, mitigation strategies, and their influence on the memory consumption. The analysis of various methods of stack protection has given us an estimate of the additional memory required for the implementation of specific techniques. The size of the additional memory depends on many factors including computer architecture, OS environment, programming languages used to create the program. For the protection methods considered in the paper, the cost may vary from the insignificant amount for prevention purposes, based on the careful analysis of input data in the program, to the use of Guard Pages when extra memory may include additional pages of the memory. In many cases developers have to use various mitigation strategies in order to make programs less vulnerable to buffer overflows. The main contribution of this paper is the analysis and evaluation of the additional memory required for the various methods of protection from buffer overflow. The current paper allows readers to understand the cost of these methods more clearly, which, in turn, will result in more efficient and secure programs. The results of this paper are useful for both software developers and the instructors who teach methods of secure programming.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Automatic Buffer Overflow Warning Validation
    Gao, Feng-Juan
    Wang, Yu
    Wang, Lin-Zhang
    Yang, Zijiang
    Li, Xuan-Dong
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2020, 35 (06) : 1406 - 1427
  • [23] Buffer Overflow Detection on Binary Code
    郑燕飞
    李晖
    陈克非
    Journal of Shanghai Jiaotong University(Science), 2006, (02) : 224 - 229
  • [24] A Poisson limit for buffer overflow probabilities
    Cao, J
    Ramanan, K
    IEEE INFOCOM 2002: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 994 - 1003
  • [25] BUFFER OVERFLOW EXPLOIT AND DEFENSIVE TECHNIQUES
    Fu, Desheng
    Shi, Feiyue
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 87 - 90
  • [26] Buffer Overflow Attack and Defense Techniques
    Alzahrani, Sabah M.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (12): : 207 - 212
  • [27] Buffer overflow period in a MAP queue
    Chydzinski, Andrzej
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2007, 2007
  • [28] Buffer overflow management with class segregation
    Al-Bawani, Kamal
    Souza, Alexander
    INFORMATION PROCESSING LETTERS, 2013, 113 (04) : 145 - 150
  • [29] Precisely detecting buffer overflow vulnerabilities
    Wang, Lei
    Li, Ji
    Li, Bo-Yang
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2008, 36 (11): : 2200 - 2204
  • [30] Detection and prevention of stack buffer overflow attacks
    Kuperman, BA
    Brodley, CE
    Ozdoganoglu, H
    Vijaykumar, TN
    Jalote, A
    COMMUNICATIONS OF THE ACM, 2005, 48 (11) : 50 - 56