Runtime countermeasures for code injection attacks against C and C++ programs

  • Authors:
  • Yves Younan;Wouter Joosen;Frank Piessens

  • Affiliations:
  • Katholieke Universiteit Leuven;Katholieke Universiteit Leuven;Katholieke Universiteit Leuven

  • Venue:
  • ACM Computing Surveys (CSUR)
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

The lack of memory safety in C/C++ often leads to vulnerabilities. Code injection attacks exploit these vulnerabilities to gain control over the execution flow of applications. These attacks have played a key role in many major security incidents. Consequently, a huge body of research on countermeasures exists. We provide a comprehensive and structured survey of vulnerabilities and countermeasures that operate at runtime. These countermeasures make different trade-offs in terms of performance, effectivity, compatibility, etc., making it hard to evaluate and compare countermeasures in a given context. We define a classification and evaluation framework on the basis of which countermeasures can be assessed.