首页> 外文会议>2011 Sixth International Conference on Availability, Reliability and Security >Implicit Buffer Overflow Protection Using Memory Segregation
【24h】

Implicit Buffer Overflow Protection Using Memory Segregation

机译:使用内存隔离的隐式缓冲区溢出保护

获取原文

摘要

Computing systems continue to be plagued by malicious corruption of instructions and data. Buffer overflows, in particular, are often employed to disrupt the control flow of vulnerable processes. Existing methods of protection against these attacks operate by detecting corruption after it has taken place or by ensuring that if corruption has taken place, it cannot be used to hijack a process' control flow. These methods thus still allow the corruption of control data to occur but, rather than being subverted, the process may terminate or take some other defined error. Few methods have attempted to prevent the corruption of control data, and those that have only focused on preventing the corruption of the return address. We propose the use of multiple memory segments to support multiple stacks, heaps, bss, and data sections per process with the goal of segregating control and non-control data. By segregating these different forms of data, we can prevent the corruption of control data by overflow and address manipulation of memory allocated for non-control data. We show that the creation of these additional data segments per process can be implemented through modifications to the compiler.
机译:计算系统继续受到恶意破坏指令和数据的困扰。特别是,缓冲区溢出通常用于破坏易受攻击的进程的控制流。现有的针对这些攻击的防护方法是通过在发生损坏后对其进行检测,或者确保如果发生了损坏,则不能将其用于劫持进程的控制流。因此,这些方法仍然允许发生控制数据损坏,但是该过程可能会终止或发生一些其他定义的错误,而不是被破坏。很少有方法试图防止控制数据的损坏,而那些只专注于防止返回地址损坏的方法。我们建议使用多个内存段来支持每个进程多个堆栈,堆,bss和数据段,目的是分离控制数据和非控制数据。通过隔离这些不同形式的数据,我们可以防止溢出和为非控制数据分配的内存的地址操纵来破坏控制数据。我们展示了可以通过修改编译器来实现每个进程创建这些额外的数据段。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号