Improving Compiler to Prevent Buffer Overflow Attack 


Vol. 9,  No. 4, pp. 453-458, Aug.  2002
10.3745/KIPSTC.2002.9.4.453


PDF
  Abstract

Recently, the number of hacking, that use buffer overflow vulnerabilities, are increasing. Although the buffer overflow problem has been known for a long time, for the following reasons, it continues to present a serious security threat. There are three defense method of buffer overflow attack. First, allow overwrite but do not allow unauthorized change of control flow. Second, do not allow overwriting at all. Third, allow change of control flow, but prevents execution of injected code. This paper is for allowing overwrites but do not allow unauthorized change of control flow which is the solution of extending compiler. The previous defense method has two defects. First, a program company with overhead because it do much thing before than applying for the method in execution of process. Second, each time function returns, it store return address in reserved memory created by compiler. This cause waste of memory too much. The new proposed method is to extend compiler, by processing after compiling and linking time. To complement these defects, we can reduce things to do in execution time. By processing additional steps after compile/linking time and before execution time. We can reduce overhead.

  Statistics


  Cite this article

[IEEE Style]

J. E. Kim, S. U. Lee, M. P. Hong, "Improving Compiler to Prevent Buffer Overflow Attack," The KIPS Transactions:PartC, vol. 9, no. 4, pp. 453-458, 2002. DOI: 10.3745/KIPSTC.2002.9.4.453.

[ACM Style]

Jong Ewi Kim, Seong Uck Lee, and Man Pyo Hong. 2002. Improving Compiler to Prevent Buffer Overflow Attack. The KIPS Transactions:PartC, 9, 4, (2002), 453-458. DOI: 10.3745/KIPSTC.2002.9.4.453.