StackSpecter: Detecting Stack Buffer Overflows for the Xtensa Architecture

This paper presents a new approach, StackSpecter, for stack buffer overflow detection, specifically for architectures with register windows. It uses a combination of plausibility checks for stack pointers and obfuscation using a secret XOR key. This combination allows it to give similar security gua...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Australasian Telecommunication Networks and Applications Conference [proceedings] s. 1 - 7
Hlavní autori: Lehniger, Kai, Langendorfer, Peter
Médium: Konferenčný príspevok..
Jazyk:English
Vydavateľské údaje: IEEE 27.11.2024
Predmet:
ISSN:2474-154X
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Popis
Shrnutí:This paper presents a new approach, StackSpecter, for stack buffer overflow detection, specifically for architectures with register windows. It uses a combination of plausibility checks for stack pointers and obfuscation using a secret XOR key. This combination allows it to give similar security guar-antees as stack canaries but without the need of adjustments to the stack frame layout. StackSpecter was implemented by modifying the FreeRTOS operating system of a ESP32 microcontroller. The performance overhead was evaluated using BEEBS, showing an average overhead of only 0.114%, a large improvement compared to stack canaries, and a worst-case overhead of 64.854% compared to an unprotected application.
ISSN:2474-154X
DOI:10.1109/ITNAC62915.2024.10815333