StackSpecter: Detecting Stack Buffer Overflows for the Xtensa Architecture
This paper presents a new approach, StackSpecter, for stack buffer overflow detection, specifically for architectures with register windows. It uses a combination of plausibility checks for stack pointers and obfuscation using a secret XOR key. This combination allows it to give similar security gua...
Uloženo v:
| Vydáno v: | Australasian Telecommunication Networks and Applications Conference [proceedings] s. 1 - 7 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
27.11.2024
|
| Témata: | |
| ISSN: | 2474-154X |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Shrnutí: | This paper presents a new approach, StackSpecter, for stack buffer overflow detection, specifically for architectures with register windows. It uses a combination of plausibility checks for stack pointers and obfuscation using a secret XOR key. This combination allows it to give similar security guar-antees as stack canaries but without the need of adjustments to the stack frame layout. StackSpecter was implemented by modifying the FreeRTOS operating system of a ESP32 microcontroller. The performance overhead was evaluated using BEEBS, showing an average overhead of only 0.114%, a large improvement compared to stack canaries, and a worst-case overhead of 64.854% compared to an unprotected application. |
|---|---|
| ISSN: | 2474-154X |
| DOI: | 10.1109/ITNAC62915.2024.10815333 |