首页> 外文会议>Annual IEEE/IFIP International Conference on Dependable Systems and Networks >To Detect Stack Buffer Overflow with Polymorphic Canaries
【24h】

To Detect Stack Buffer Overflow with Polymorphic Canaries

机译:使用多态金丝雀检测堆栈缓冲区溢出

获取原文

摘要

Stack Smashing Protection (SSP) is a simple and highly efficient technique widely used in practice as the front line defense against stack buffer overflow attacks. Unfortunately, SSP is known to be vulnerable to the so-called byte-by-byte attack. Although several remedy schemes are proposed in the recent literature, their security is achieved at the price of practicality, because their complex logics ruin SSP's simplicity and high-efficiency. In this paper, we present an elegant solution named as Polymorphic SSP (P-SSP) that attains the same security without sacrificing SSP's strengths. We also propose three extensions of the basic scheme for better compatibility, stronger security, and local variable protection, respectively. We have implemented both a compiler plugin and a binary instrumentation tool for deploying P-SSP. Their respective runtime overheads are only 0.24% and 1.01%. We have also experimented with our extensions and compared their pros and cons with the basic scheme.
机译:堆栈粉碎保护(SSP)是一种简单高效的技术,在实践中广泛用作针对堆栈缓冲区溢出攻击的前线防御。不幸的是,众所周知,SSP容易受到所谓的逐字节攻击。尽管在最近的文献中提出了几种补救方案,但是它们的安全性是以实用性为代价的,因为它们复杂的逻辑破坏了SSP的简单性和高效性。在本文中,我们提出了一种优雅的解决方案,称为多态SSP(P-SSP),它可以在不牺牲SSP优势的情况下达到相同的安全性。我们还提出了基本方案的三个扩展,分别具有更好的兼容性,更强的安全性和局部变量保护。我们已经实现了用于部署P-SSP的编译器插件和二进制工具。它们各自的运行时开销仅为0.24 \%和1.01 \%。我们还对扩展进行了实验,并将其优缺点与基本方案进行了比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号