The Cost of Preventing a Buffer Overflow

被引:0
|
作者
Gordonov, Anatoliy S.
机构
关键词
buffer overflows; mitigation strategies; memory consumption;
D O I
暂无
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
In the paper we have considered the main methods of buffer overflows, mitigation strategies, and their influence on the memory consumption. The analysis of various methods of stack protection has given us an estimate of the additional memory required for the implementation of specific techniques. The size of the additional memory depends on many factors including computer architecture, OS environment, programming languages used to create the program. For the protection methods considered in the paper, the cost may vary from the insignificant amount for prevention purposes, based on the careful analysis of input data in the program, to the use of Guard Pages when extra memory may include additional pages of the memory. In many cases developers have to use various mitigation strategies in order to make programs less vulnerable to buffer overflows. The main contribution of this paper is the analysis and evaluation of the additional memory required for the various methods of protection from buffer overflow. The current paper allows readers to understand the cost of these methods more clearly, which, in turn, will result in more efficient and secure programs. The results of this paper are useful for both software developers and the instructors who teach methods of secure programming.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] SCISM: A Solution for General Buffer Overflow Protection
    Fu, Jian-Jing
    Wang, Ji-Lin
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 429 - 434
  • [42] Buffer overflow vulnerabilities in CUDA: a preliminary analysis
    Miele, Andrea
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2016, 12 (02) : 113 - 120
  • [43] To Detect Stack Buffer Overflow With Polymorphic Canaries
    Wang, Zhilong
    Ding, Xuhua
    Pang, Chengbin
    Guo, Jian
    Zhu, Jun
    Mao, Bing
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, : 243 - 254
  • [44] Study on the Principle and Defense of Buffer Overflow Attacks
    Lin, Wang
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [45] On the estimation of buffer overflow probabilities from measurements
    Paschalidis, IC
    Vassilaras, S
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (01) : 178 - 191
  • [46] AIFD: A runtime solution to buffer overflow attack
    Han, Hong
    Lu, Xian-Liang
    Ren, Li-Yong
    Chen, Bo
    Yang, Ning
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3189 - 3194
  • [47] New chips stop buffer overflow attacks
    Dailey, L
    COMPUTER, 2004, 37 (10) : 28 - 28
  • [48] Automatic Exploit Generation for Buffer Overflow Vulnerabilities
    Xu, Luhang
    Jia, Weixi
    Dong, Wei
    Li, Yongjun
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 463 - 468
  • [49] Statically detecting likely buffer overflow vulnerabilities
    Larochelle, D
    Evans, D
    USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, 2001, : 177 - 189
  • [50] Buffer overflow asymptotics for multiplexed regulated traffic
    Ying, Y.
    Guillemin, F.
    Mazumdar, R.
    Rosenberg, C.
    PERFORMANCE EVALUATION, 2008, 65 (08) : 555 - 572