首页> 外文期刊>Computing reviews >Instruction-level countermeasures against stack-based buffer overflow attacks
【24h】

Instruction-level countermeasures against stack-based buffer overflow attacks

机译:针对基于堆栈的缓冲区溢出攻击的指令级对策

获取原文
获取原文并翻译 | 示例
           

摘要

Gadaleta et al. explore the use of virtualization "to implement a countermeasure against buffer overflow attacks." The idea is to emulate the already existing techniques-in particular, the return address defender (RAD) technique-avoiding the performance penalty introduced by them.rnBasically, the authors propose modifying the instruction set of the architectures. They obtain this by modifyingrnthe set of instructions that is emulated by a hypervisor. This incurs a high overhead, so an alternative to hardware implementation is emulated by modifying a QEMU virtual machine.
机译:Gadaleta等。探索虚拟化的使用“以实施对付缓冲区溢出攻击的对策”。这个想法是为了模仿已经存在的技术,特别是返回地址防御程序(RAD)技术,以避免它们引入的性能损失。基本上,作者建议修改体系结构的指令集。他们通过修改虚拟机管理程序模拟的指令集来获得此功能。这会产生高昂的开销,因此,通过修改QEMU虚拟机来模拟硬件实现的替代方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号