A buffer overflow attack is perhaps the most common attack used to compromise the security of a host. A buffer overflow can be used to change the function return address and redirect execution to execute the attacker\u27s code. We present a hardware-based solution, called SmashGuard, to protecting the return addresses stored on the program stack. SmashGuard protects against all known forms of attack on the function return address pointer. With each function call instruction a new return address is pushed onto an extra hardware stack. A return instruction compares its return address to the address from the top of the hardware stack. If a mismatch is detected, then an exception is raised. Because the stack operations and checks are done in ha...
Buffer-overflow attacks began two decades ago and persist today. Over that time, many solutions to p...
Memory corruption vulnerabilities, such as stack-based buffer overflows, continue to be a major thre...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
[[abstract]]Buffer overflow has always been a dominant issue of system security. Many computer virus...
Buffer overflow attack can inflict upon almost arbitrary programs and is one of the most common vuln...
Buffer overflow and heap overflow injection attacks have been studied for some time. Recent techniqu...
Buffer overflow vulnerabilities are the most prevalent security vulnerabilities; they are responsibl...
With more embedded systems networked, it becomes an important research problem to effectively defend...
This paper presents a systematic solution to the per-sistent problem of buffer overflow attacks. Buf...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Control-flow integrity (CFI) is considered as a general and promising method to prevent code-reuse a...
Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, pote...
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly...
Embedded systems are deployed in security critical environments and have become a prominent target f...
Buffer-overflow attacks began two decades ago and persist today. Over that time, many solutions to p...
Memory corruption vulnerabilities, such as stack-based buffer overflows, continue to be a major thre...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
[[abstract]]Buffer overflow has always been a dominant issue of system security. Many computer virus...
Buffer overflow attack can inflict upon almost arbitrary programs and is one of the most common vuln...
Buffer overflow and heap overflow injection attacks have been studied for some time. Recent techniqu...
Buffer overflow vulnerabilities are the most prevalent security vulnerabilities; they are responsibl...
With more embedded systems networked, it becomes an important research problem to effectively defend...
This paper presents a systematic solution to the per-sistent problem of buffer overflow attacks. Buf...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Control-flow integrity (CFI) is considered as a general and promising method to prevent code-reuse a...
Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, pote...
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly...
Embedded systems are deployed in security critical environments and have become a prominent target f...
Buffer-overflow attacks began two decades ago and persist today. Over that time, many solutions to p...
Memory corruption vulnerabilities, such as stack-based buffer overflows, continue to be a major thre...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...