Protection against Buffer Overflow Attacks through Runtime Memory Layout Randomization
To date a number of comprehensive techniques have been proposed to defend against buffer over attacks. In spite of continuing research in this area, security vulnerabilities in software continue to be discovered and exploited. This is because the existing protection techniques suffer from one or mor...
Saved in:
| Published in: | 2014 International Conference on Information Technology pp. 184 - 189 |
|---|---|
| Main Authors: | , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.12.2014
|
| Subjects: | |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | To date a number of comprehensive techniques have been proposed to defend against buffer over attacks. In spite of continuing research in this area, security vulnerabilities in software continue to be discovered and exploited. This is because the existing protection techniques suffer from one or more of the following problems: high run time overheads (often exceeding 100%), incompatibility with legacy C and C++ code, not sufficiently fine grained randomization of memory layout and the inability to perform randomization at run time rather than compile time or link time or load time. While security through diversity is a promising technique to defend against large scale cyber attacks, existing techniques are susceptible to information leakage and brute-force attacks, in addition to the short comings indicated above. To overcome the above indicated drawbacks, in this paper we propose Function Frame Run time Randomization (FFRR) technique. FFRR offers memory layout randomization at run time and performs randomization at the level of individual variables on the stack. |
|---|---|
| AbstractList | To date a number of comprehensive techniques have been proposed to defend against buffer over attacks. In spite of continuing research in this area, security vulnerabilities in software continue to be discovered and exploited. This is because the existing protection techniques suffer from one or more of the following problems: high run time overheads (often exceeding 100%), incompatibility with legacy C and C++ code, not sufficiently fine grained randomization of memory layout and the inability to perform randomization at run time rather than compile time or link time or load time. While security through diversity is a promising technique to defend against large scale cyber attacks, existing techniques are susceptible to information leakage and brute-force attacks, in addition to the short comings indicated above. To overcome the above indicated drawbacks, in this paper we propose Function Frame Run time Randomization (FFRR) technique. FFRR offers memory layout randomization at run time and performs randomization at the level of individual variables on the stack. |
| Author | Kisore, N. Raghu Kumar, K. Shiva |
| Author_xml | – sequence: 1 givenname: K. Shiva surname: Kumar fullname: Kumar, K. Shiva email: kshivakumar@idrbt.ac.in organization: Sch. of Comput. & Inf. Sci., Univ. of Hyderabad, Hyderabad, India – sequence: 2 givenname: N. Raghu surname: Kisore fullname: Kisore, N. Raghu email: nraghukisore@idrbt.ac.in organization: Inst. for Dev. & Res. in Banking Technol., Hyderabad, India |
| BookMark | eNotzLtOwzAUAFAjwUALGxuLfyDBrzjOWCIekYKKqsJaOc51a9HYyHFA4esBwXS2s0CnPnhA6IqSnFJS3TR1s80ZoSIvyhO0oKKsKkUUV-fo9TmGBCa54LHea-fHhG8nayHi9QdEewyfeJWSNm8jTocYpv0Bbyaf3AD4CYYQZ9zqOUwJb7Tvw-C-9O91gc6sPo5w-e8SvdzfbevHrF0_NPWqzRwTRcoM6ZlVTBrNjaG95VpVTAHvbccqorrOcml7JjopqBFESlkYYQCY_UHwgi_R9d_rAGD3Ht2g47wrCeecVvwbhAZOmg |
| CODEN | IEEPAD |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICIT.2014.57 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 1479980838 9781479980833 9781479980840 1479980846 |
| EndPage | 189 |
| ExternalDocumentID | 7033319 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i245t-c0d2f826ca3cc1df3a8928e3dfb2908bbf36fd24b641c406665c4cee2fc4c4353 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000380457800033&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Thu Jun 29 18:37:52 EDT 2023 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i245t-c0d2f826ca3cc1df3a8928e3dfb2908bbf36fd24b641c406665c4cee2fc4c4353 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_7033319 |
| PublicationCentury | 2000 |
| PublicationDate | 2014-Dec. |
| PublicationDateYYYYMMDD | 2014-12-01 |
| PublicationDate_xml | – month: 12 year: 2014 text: 2014-Dec. |
| PublicationDecade | 2010 |
| PublicationTitle | 2014 International Conference on Information Technology |
| PublicationTitleAbbrev | ICOIT |
| PublicationYear | 2014 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.561021 |
| Snippet | To date a number of comprehensive techniques have been proposed to defend against buffer over attacks. In spite of continuing research in this area, security... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 184 |
| SubjectTerms | Generators Hardware Internet large scale cyber-attack Layout Libraries memory randomization program stack Security Software |
| Title | Protection against Buffer Overflow Attacks through Runtime Memory Layout Randomization |
| URI | https://ieeexplore.ieee.org/document/7033319 |
| WOSCitedRecordID | wos000380457800033&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LS8MwGA9zePCksolvcvBo90jSJj3qcDiYs4wpu408vsjAtbK1yv57k7ZMBC9CoCGHNnz5IPma3wOhGxtyIrnRQeTOEgGTMgwUeHltoW0_5JZxVUrmj_lkIubzOGmg2x0XBgBK8Bl0fLe8yzeZLvyvsq7LTkq9xuce51HF1dph2ePuaDCaeawW64S_vVLKrWJ4-L-PHKH2D-cOJ7vd5Bg1IG2h16SSUXDBw_LNFfGbHN8X3tIEP7sctO_ZF77Lc8-Tx7XjDp5684cV4CePod3isdxmRY6nMjXZqiZdttHL8GE2eAxqJ4RgSViYB7pniHWFgJZU676xVIqYCKDGKhL3hFKWRtYQpiLW18yXJKFmbsLEuoc7ENET1EyzFE4R9iWCUlSCkpIRsIKDcO8BFrmmhTlDLR-TxUcldrGow3H-9_AFOvARr_Adl6iZrwu4Qvv6M19u1tflCn0DhF2X7A |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LS8MwGA9DBT2pbOLbHDzaPfJo06MOx4bdHGPKbiNPGbhWtlTZf2_SlongRQg05NCGLx8kX_N7AHBraIR4pGQQurNEQDingdBeXptJ06GRIZEoJPOTaDRis1k8roG7LRdGa12Az3TTd4u7fJXJ3P8qa7nsxNhrfO5SQlC7ZGtt0exxa9AdTD1aizTpb7eUYrPoHf7vM0eg8cO6g-PtfnIMajqtg9dxKaTgwgf5myvj1xY-5N7UBD67LDTv2Re8t9Yz5WHluQMn3v5hqeHQo2g3MOGbLLdwwlOVLSvaZQO89B6n3X5QeSEEC0SoDWRbIeNKAcmxlB1lMGcxYhorI1DcZkIYHBqFiAhJRxJflFBJ3ISRcQ93JMInYCfNUn0KoC8ShMBcC84J0oZFmrn3aBK6Jpk6A3Ufk_lHKXcxr8Jx_vfwDdjvT4fJPBmMni7AgY9-ifa4BDt2lesrsCc_7WK9ui5W6xuWH5sz |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+International+Conference+on+Information+Technology&rft.atitle=Protection+against+Buffer+Overflow+Attacks+through+Runtime+Memory+Layout+Randomization&rft.au=Kumar%2C+K.+Shiva&rft.au=Kisore%2C+N.+Raghu&rft.date=2014-12-01&rft.pub=IEEE&rft.spage=184&rft.epage=189&rft_id=info:doi/10.1109%2FICIT.2014.57&rft.externalDocID=7033319 |