Hardware and Binary Modification Support for Code Pointer Protection From Buffer Overflow
Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture
Hardware support for code integrity in embedded processors
Proceedings of the 2005 international conference on Compilers, architectures and synthesis for embedded systems
Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks
IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Computers
Hardware/software optimization for array & pointer boundary checking against buffer overflow attacks
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
Proceedings of the conference on Design, automation and test in Europe
3GTSM: a novel 3G terminals security model
IMCAS'07 Proceedings of the 6th WSEAS International Conference on Instrumentation, Measurement, Circuits and Systems
An efficient runtime instruction block verification for secure embedded systems
Journal of Embedded Computing - Embeded Processors and Systems: Architectural Issues and Solutions for Emerging Applications
Time-based intrusion detection in cyber-physical systems
Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Securing the data path of next-generation router systems
Computer Communications
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
XOR-based frame loss recovery scheme for video streaming
Computer Communications
Runtime countermeasures for code injection attacks against C and C++ programs
ACM Computing Surveys (CSUR)
Memory monitor module for embedded systems
Computers and Electrical Engineering
Hi-index | 0.00 |
Buffer overflow attacks have been causing serious securityproblems for decades. With more embedded systemsnetworked, it becomes an important research problem todefend embedded systems against buffer overflow attacks.In this paper, we propose the Hardware/Software AddressProtection (HSAP) technique to solve this problem. We firstclassify buffer overflow attacks into two categories (stacksmashing attacks and function pointer attacks) and thenprovide two corresponding defending strategies. In ourtechnique, hardware boundary check method and functionpointer XOR method are used to protect a system againststack smashing attacks and function pointer attacks, respectively.Although the focus of the HSAP technique is on embeddedsystems because of the availability of hardware support,we show that the HSAP technique can be applied toany type of processors to defend against buffer overflow attacks.We use four classes of processors to illustrate thatthe applicability of our technique is independent of architectures.We experiment with our HSAP technique in ARMEvaluator-7T simulation development environments. Theresults show that our HSAP technique can defend a systemagainst more types of buffer overflow attacks with littleoverhead than the previous work.