StackGhost: Hardware facilitated stack protection

  • Authors:
  • Mike Frantzen;Mike Shuey

  • Affiliations:
  • CERIAS;Engineering Computer Network

  • Venue:
  • SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

Conventional Security have relied on overwriting the saved return pointer on the stack to hijack the path of execution. Under Sun Microsystem's Sparc processor architecture, we were able to implement a kernel modification to transparently and automatically guard application's return pointers. Our implementation called Stack Ghost Open-BSD 2.8 acts as a ghost in the machine. Stack-Ghost advances exploit prevention in that it protects every application run on the system without their knowledge nor does it require their source or binary modification. We will document several of the methods devised to preserve the sanctity of the system and will explore the performance ramifications of Stack Ghost.