StackSpecter: Detecting Stack Buffer Overflows for the Xtensa Architecture

This paper presents a new approach, StackSpecter, for stack buffer overflow detection, specifically for architectures with register windows. It uses a combination of plausibility checks for stack pointers and obfuscation using a secret XOR key. This combination allows it to give similar security gua...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Australasian Telecommunication Networks and Applications Conference [proceedings] s. 1 - 7
Hlavní autoři: Lehniger, Kai, Langendorfer, Peter
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 27.11.2024
Témata:
ISSN:2474-154X
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:This paper presents a new approach, StackSpecter, for stack buffer overflow detection, specifically for architectures with register windows. It uses a combination of plausibility checks for stack pointers and obfuscation using a secret XOR key. This combination allows it to give similar security guar-antees as stack canaries but without the need of adjustments to the stack frame layout. StackSpecter was implemented by modifying the FreeRTOS operating system of a ESP32 microcontroller. The performance overhead was evaluated using BEEBS, showing an average overhead of only 0.114%, a large improvement compared to stack canaries, and a worst-case overhead of 64.854% compared to an unprotected application.
ISSN:2474-154X
DOI:10.1109/ITNAC62915.2024.10815333