首页> 外文期刊>IEEE transactions on dependable and secure computing >Secure Bit: Transparent, Hardware Buffer-Overflow Protection
【24h】

Secure Bit: Transparent, Hardware Buffer-Overflow Protection

机译:安全位:透明的硬件缓冲区溢出保护

获取原文
获取原文并翻译 | 示例

摘要

We propose a minimalist, architectural approach, Secure Bit (patent pending), to protect against buffer overflow attacks on control data (return-address and function-pointer attacks in particular). Secure Bit provides a hardware bit to protect the integrity of addresses for the purpose of preventing such buffer-overflow attacks. Secure Bit is transparent to user software: it provides backward compatibility with legacy user code. It can detect and prevent all address-corrupting buffer-overflow attacks with little runtime performance penalty. Addresses passed in buffers between processes are marked insecure, and control instructions using those addresses as targets will raise an exception. An important differentiating aspect of our protocol is that, once an address has been marked as insecure, there is no instruction to remark it as secure. Robustness and transparency are demonstrated by emulating the hardware, booting Linux on the emulator, running application software on that Linux, and performing known attacks
机译:我们提出了一种极简的体系结构方法安全位(正在申请专利),以防止对控制数据进行缓冲区溢出攻击(特别是返回地址和功能指针攻击)。安全位提供了一个硬件位来保护地址的完整性,以防止此类缓冲区溢出攻击。 Secure Bit对用户软件是透明的:它提供与旧版用户代码的向后兼容性。它可以检测并防止所有破坏地址的缓冲区溢出攻击,而对运行时性能的影响很小。在进程之间的缓冲区中传递的地址被标记为不安全,使用这些地址作为目标的控制指令将引发异常。我们协议的重要区别在于,一旦地址被标记为不安全,就没有指令将其标记为安全。通过仿真硬件,在仿真器上启动Linux,在该Linux上运行应用程序软件以及执行已知的攻击来展示鲁棒性和透明性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号