Run-time detection of buffer overflow attacks without explicit sensor data objects

Changwoo Pyo, Byungchul Bae, Taejin Kim, Gyungho Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

This paper presents two schemes for detecting buffer overflow attacks at run-time. One is sensor embedding, which hides sensor data objects inside code pointers, and the other, stack frame inversion checking, which detects attacks by inspecting processor registers. Our methods make it difficult for attackers to guess the locations of sensors so that they cannot easily bypass sensors when they attempt to access code pointers. We have implemented the schemes by extending the GCC toolchain. Experimental data shows that our schemes provide programs with powerful detection and protection capabilities at the reasonable sacrifice of execution efficiency. Operating systems would improve on the defense against buffer overflow attacks by using our toolchain when they are built.

Original languageEnglish
Title of host publicationInternational Conferen ON Information Technology
Subtitle of host publicationCoding Computing, ITCC 2004
EditorsP.K. Srimani, A. Abraham, M. Cannataro, J. Domingo-Ferrer, R. Hashemi
Pages50-54
Number of pages5
Publication statusPublished - 2004
EventInternational Conference on Information Technology: Coding Computing, ITCC 2004 - Las Vegas, NV, United States
Duration: 2004 Apr 52004 Apr 7

Publication series

NameInternational Conference on Information Technology: Coding Computing, ITCC
Volume1

Other

OtherInternational Conference on Information Technology: Coding Computing, ITCC 2004
CountryUnited States
CityLas Vegas, NV
Period04/4/504/4/7

ASJC Scopus subject areas

  • Software
  • Information Systems
  • Engineering(all)

Fingerprint Dive into the research topics of 'Run-time detection of buffer overflow attacks without explicit sensor data objects'. Together they form a unique fingerprint.

  • Cite this

    Pyo, C., Bae, B., Kim, T., & Lee, G. (2004). Run-time detection of buffer overflow attacks without explicit sensor data objects. In P. K. Srimani, A. Abraham, M. Cannataro, J. Domingo-Ferrer, & R. Hashemi (Eds.), International Conferen ON Information Technology: Coding Computing, ITCC 2004 (pp. 50-54). (International Conference on Information Technology: Coding Computing, ITCC; Vol. 1).