The Cost of Preventing a Buffer Overflow

被引:0
|
作者
Gordonov, Anatoliy S.
机构
关键词
buffer overflows; mitigation strategies; memory consumption;
D O I
暂无
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
In the paper we have considered the main methods of buffer overflows, mitigation strategies, and their influence on the memory consumption. The analysis of various methods of stack protection has given us an estimate of the additional memory required for the implementation of specific techniques. The size of the additional memory depends on many factors including computer architecture, OS environment, programming languages used to create the program. For the protection methods considered in the paper, the cost may vary from the insignificant amount for prevention purposes, based on the careful analysis of input data in the program, to the use of Guard Pages when extra memory may include additional pages of the memory. In many cases developers have to use various mitigation strategies in order to make programs less vulnerable to buffer overflows. The main contribution of this paper is the analysis and evaluation of the additional memory required for the various methods of protection from buffer overflow. The current paper allows readers to understand the cost of these methods more clearly, which, in turn, will result in more efficient and secure programs. The results of this paper are useful for both software developers and the instructors who teach methods of secure programming.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] A Combinatorial Approach to Detecting Buffer Overflow Vulnerabilities
    Wang, Wenhua
    Lei, Yu
    Liu, Donggang
    Kung, David
    Csallner, Christoph
    Zhang, Dazhi
    Kacker, Raghu
    Kuhn, Rick
    2011 IEEE/IFIP 41ST INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2011, : 269 - 278
  • [32] ASSESSING TEST SUITES FOR BUFFER OVERFLOW VULNERABILITIES
    Shahriar, Hossain
    Zulkernine, Mohammad
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2010, 20 (01) : 73 - 101
  • [33] Evolving buffer overflow attacks with detector feedback
    Kayacik, H. Gunes
    Heywood, Malcolm I.
    Zincir-Heywood, A. Nur
    APPLICATIONS OF EVOLUTIONARY COMPUTING, PROCEEDINGS, 2007, 4448 : 11 - +
  • [34] Defending against Buffer-Overflow Vulnerabilities
    Padmanabhuni, Bindu Madhavi
    Tan, Hee Beng Kuan
    COMPUTER, 2011, 44 (11) : 53 - 60
  • [35] Defeating buffer overflow attacks via virtualization
    Tian, Donghai
    Xiong, Xi
    Hu, Changzhen
    Liu, Peng
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1940 - 1950
  • [36] Self-prevention of socket buffer overflow
    Choi, Jin-Hee
    Kim, Young-Pil
    Yoo, Chuck
    COMPUTER NETWORKS, 2007, 51 (08) : 1942 - 1954
  • [37] Defeating Buffer Overflow A Trivial but Dangerous Bug
    Black, Paul E.
    Bojanova, Irena
    IT PROFESSIONAL, 2016, 18 (06) : 58 - 61
  • [38] Estimation of buffer overflow probability by OPNET modeling
    Kulikovs, Mihails
    Petersons, Ernests
    INFORMATION TECHNOLOGIES' 2008, PROCEEDINGS, 2008, : 145 - 149
  • [39] Program Transformations to Fix C Buffer Overflow
    Shaw, Alex
    36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE COMPANION 2014), 2014, : 733 - 735
  • [40] Analysis of buffer overflow exploits and Prevention Strategies
    Xu, ShuXin
    Chen, JunZhang
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1701 - 1704