A reliable return address stack: microarchitectural features to defeat stack smashing

  • Authors:
  • Dong Ye;David Kaeli

  • Affiliations:
  • Northeastern University, Boston, Massachusetts;Northeastern University, Boston, Massachusetts

  • Venue:
  • ACM SIGARCH Computer Architecture News - Special issue: Workshop on architectural support for security and anti-virus (WASSA)
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Buffer overflow vulnerability is one of the most common security bugs existing in today's software systems. In this paper, we propose a microarchitectural design of a return address stack aiming to detect and stop stack smashing. This approach has been used in other proposals to guard against buffer overflow vulnerabilities. Our contribution is a design that handle multipath execution, speculative execution, abnormal control flow, and extended call depth. Our solution makes no assumption about the presence of architecturally visible calls and returns.