Protection against Buffer Overflow Attacks through Runtime Memory Layout Randomization

To date a number of comprehensive techniques have been proposed to defend against buffer over attacks. In spite of continuing research in this area, security vulnerabilities in software continue to be discovered and exploited. This is because the existing protection techniques suffer from one or mor...

Full description

Saved in:
Bibliographic Details
Published in:2014 International Conference on Information Technology pp. 184 - 189
Main Authors: Kumar, K. Shiva, Kisore, N. Raghu
Format: Conference Proceeding
Language:English
Published: IEEE 01.12.2014
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract To date a number of comprehensive techniques have been proposed to defend against buffer over attacks. In spite of continuing research in this area, security vulnerabilities in software continue to be discovered and exploited. This is because the existing protection techniques suffer from one or more of the following problems: high run time overheads (often exceeding 100%), incompatibility with legacy C and C++ code, not sufficiently fine grained randomization of memory layout and the inability to perform randomization at run time rather than compile time or link time or load time. While security through diversity is a promising technique to defend against large scale cyber attacks, existing techniques are susceptible to information leakage and brute-force attacks, in addition to the short comings indicated above. To overcome the above indicated drawbacks, in this paper we propose Function Frame Run time Randomization (FFRR) technique. FFRR offers memory layout randomization at run time and performs randomization at the level of individual variables on the stack.
AbstractList To date a number of comprehensive techniques have been proposed to defend against buffer over attacks. In spite of continuing research in this area, security vulnerabilities in software continue to be discovered and exploited. This is because the existing protection techniques suffer from one or more of the following problems: high run time overheads (often exceeding 100%), incompatibility with legacy C and C++ code, not sufficiently fine grained randomization of memory layout and the inability to perform randomization at run time rather than compile time or link time or load time. While security through diversity is a promising technique to defend against large scale cyber attacks, existing techniques are susceptible to information leakage and brute-force attacks, in addition to the short comings indicated above. To overcome the above indicated drawbacks, in this paper we propose Function Frame Run time Randomization (FFRR) technique. FFRR offers memory layout randomization at run time and performs randomization at the level of individual variables on the stack.
Author Kisore, N. Raghu
Kumar, K. Shiva
Author_xml – sequence: 1
  givenname: K. Shiva
  surname: Kumar
  fullname: Kumar, K. Shiva
  email: kshivakumar@idrbt.ac.in
  organization: Sch. of Comput. & Inf. Sci., Univ. of Hyderabad, Hyderabad, India
– sequence: 2
  givenname: N. Raghu
  surname: Kisore
  fullname: Kisore, N. Raghu
  email: nraghukisore@idrbt.ac.in
  organization: Inst. for Dev. & Res. in Banking Technol., Hyderabad, India
BookMark eNotzLtOwzAUAFAjwUALGxuLfyDBrzjOWCIekYKKqsJaOc51a9HYyHFA4esBwXS2s0CnPnhA6IqSnFJS3TR1s80ZoSIvyhO0oKKsKkUUV-fo9TmGBCa54LHea-fHhG8nayHi9QdEewyfeJWSNm8jTocYpv0Bbyaf3AD4CYYQZ9zqOUwJb7Tvw-C-9O91gc6sPo5w-e8SvdzfbevHrF0_NPWqzRwTRcoM6ZlVTBrNjaG95VpVTAHvbccqorrOcml7JjopqBFESlkYYQCY_UHwgi_R9d_rAGD3Ht2g47wrCeecVvwbhAZOmg
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICIT.2014.57
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1479980838
9781479980833
9781479980840
1479980846
EndPage 189
ExternalDocumentID 7033319
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i245t-c0d2f826ca3cc1df3a8928e3dfb2908bbf36fd24b641c406665c4cee2fc4c4353
IEDL.DBID RIE
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000380457800033&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Thu Jun 29 18:37:52 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i245t-c0d2f826ca3cc1df3a8928e3dfb2908bbf36fd24b641c406665c4cee2fc4c4353
PageCount 6
ParticipantIDs ieee_primary_7033319
PublicationCentury 2000
PublicationDate 2014-Dec.
PublicationDateYYYYMMDD 2014-12-01
PublicationDate_xml – month: 12
  year: 2014
  text: 2014-Dec.
PublicationDecade 2010
PublicationTitle 2014 International Conference on Information Technology
PublicationTitleAbbrev ICOIT
PublicationYear 2014
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.561021
Snippet To date a number of comprehensive techniques have been proposed to defend against buffer over attacks. In spite of continuing research in this area, security...
SourceID ieee
SourceType Publisher
StartPage 184
SubjectTerms Generators
Hardware
Internet
large scale cyber-attack
Layout
Libraries
memory randomization
program stack
Security
Software
Title Protection against Buffer Overflow Attacks through Runtime Memory Layout Randomization
URI https://ieeexplore.ieee.org/document/7033319
WOSCitedRecordID wos000380457800033&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LS8MwGA9zePCksolvcvBo90jSJj3qcDiYs4wpu408vsjAtbK1yv57k7ZMBC9CoCGHNnz5IPma3wOhGxtyIrnRQeTOEgGTMgwUeHltoW0_5JZxVUrmj_lkIubzOGmg2x0XBgBK8Bl0fLe8yzeZLvyvsq7LTkq9xuce51HF1dph2ePuaDCaeawW64S_vVLKrWJ4-L-PHKH2D-cOJ7vd5Bg1IG2h16SSUXDBw_LNFfGbHN8X3tIEP7sctO_ZF77Lc8-Tx7XjDp5684cV4CePod3isdxmRY6nMjXZqiZdttHL8GE2eAxqJ4RgSViYB7pniHWFgJZU676xVIqYCKDGKhL3hFKWRtYQpiLW18yXJKFmbsLEuoc7ENET1EyzFE4R9iWCUlSCkpIRsIKDcO8BFrmmhTlDLR-TxUcldrGow3H-9_AFOvARr_Adl6iZrwu4Qvv6M19u1tflCn0DhF2X7A
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LS8MwGA9DBT2pbOLbHDzaPfJo06MOx4bdHGPKbiNPGbhWtlTZf2_SlongRQg05NCGLx8kX_N7AHBraIR4pGQQurNEQDingdBeXptJ06GRIZEoJPOTaDRis1k8roG7LRdGa12Az3TTd4u7fJXJ3P8qa7nsxNhrfO5SQlC7ZGtt0exxa9AdTD1aizTpb7eUYrPoHf7vM0eg8cO6g-PtfnIMajqtg9dxKaTgwgf5myvj1xY-5N7UBD67LDTv2Re8t9Yz5WHluQMn3v5hqeHQo2g3MOGbLLdwwlOVLSvaZQO89B6n3X5QeSEEC0SoDWRbIeNKAcmxlB1lMGcxYhorI1DcZkIYHBqFiAhJRxJflFBJ3ISRcQ93JMInYCfNUn0KoC8ShMBcC84J0oZFmrn3aBK6Jpk6A3Ufk_lHKXcxr8Jx_vfwDdjvT4fJPBmMni7AgY9-ifa4BDt2lesrsCc_7WK9ui5W6xuWH5sz
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+International+Conference+on+Information+Technology&rft.atitle=Protection+against+Buffer+Overflow+Attacks+through+Runtime+Memory+Layout+Randomization&rft.au=Kumar%2C+K.+Shiva&rft.au=Kisore%2C+N.+Raghu&rft.date=2014-12-01&rft.pub=IEEE&rft.spage=184&rft.epage=189&rft_id=info:doi/10.1109%2FICIT.2014.57&rft.externalDocID=7033319