Efficient Buffer-Overflow Prevention Technique Using Binary Rewriting 


Vol. 12,  No. 3, pp. 323-330, Jun.  2005
10.3745/KIPSTC.2005.12.3.323


PDF
  Abstract

Buffer overflow is one of the most prevalent and critical internet security vulnerabilities. Recently, various methods to prevent buffer overflow attacks have been investigated, but they are still difficult to apply to real applications due to their run-time overhead. This paper suggests an efficient rewrite method to prevent buffer-overflow attacks only with lower costs by generating a redundant copy of the return address in stack frame and comparing return address to copied return address. Not to be overwritten by the attack data, the new copy will have the lower address number than local buffers have. In addition, for a safer execution environment, every vulnerable function call is transformed during the rewriting procedure.

  Statistics


  Cite this article

[IEEE Style]

Y. S. Kim and E. S. Cho, "Efficient Buffer-Overflow Prevention Technique Using Binary Rewriting," The KIPS Transactions:PartC, vol. 12, no. 3, pp. 323-330, 2005. DOI: 10.3745/KIPSTC.2005.12.3.323.

[ACM Style]

Yun Sam Kim and Eun Sun Cho. 2005. Efficient Buffer-Overflow Prevention Technique Using Binary Rewriting. The KIPS Transactions:PartC, 12, 3, (2005), 323-330. DOI: 10.3745/KIPSTC.2005.12.3.323.