首页> 外文会议> >The Dynamic Buffer Overflow Detection and Prevent ion Tool for Yindows Executables Using Binary Rewr iting
【24h】

The Dynamic Buffer Overflow Detection and Prevent ion Tool for Yindows Executables Using Binary Rewr iting

机译:基于二进制重写的Yindows可执行文件动态缓冲区溢出检测和预防工具

获取原文

摘要

This paper presents novel buffer overflow countermeasure tool for Windows portable executables at run-time. Our tool enables dynamically detecting and preventing of stack-based buffer overflow attacks for Windows applications, using binary rewriting method. Our solution protects the return address area and the previous frame pointer area of function stack frame in program stack to prevent program control flow from being changed at execution time. Protecting the return address and previous frame pointer, we have used additional stack memory area that is called safe-zone, storing original return address and previous frame pointer values. We has revised function prologue and function epilogue. The revised function prologue stores copies of the return address and the previous frame pointer values to our safe-zone, and the revised function epilogue overwrites the return address and the previous frame pointer on the stack with copies of them. The paper presents performance analysis result of our solution. The result shows that the relative performance overhead is about 1.6-2.6% and additional constant space overhead is about 25 Kbytes.
机译:本文提出了一种新颖的Windows运行时可移植可执行文件缓冲区溢出对策工具。我们的工具可以使用二进制重写方法为Windows应用程序动态检测和防止基于堆栈的缓冲区溢出攻击。我们的解决方案保护程序堆栈中函数堆栈帧的返回地址区域和前一帧指针区域,以防止在执行时更改程序控制流。为了保护返回地址和先前的帧指针,我们使用了额外的堆栈存储区,称为安全区,用于存储原始的返回地址和先前的帧指针值。我们修改了功能序言和功能序言。修改后的函数序言将返回地址和先前的帧指针值的副本存储到我们的安全区中,而修改后的函数结尾将使用它们的副本覆盖返回地址和上一帧指针在堆栈上。本文介绍了我们解决方案的性能分析结果。结果表明,相对性能开销约为1.6-2.6%,附加的恒定空间开销约为25 KB。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号