• DocumentCode
    121035
  • Title

    On the Effectiveness of NX, SSP, RenewSSP, and ASLR against Stack Buffer Overflows

  • Author

    Gisbert, Hector Marco ; Ripoll, Ismael

  • Author_Institution
    Dept. de Inf. de Sist. y Comput., Univ. Politec. de Valencia, Valencia, Spain
  • fYear
    2014
  • fDate
    21-23 Aug. 2014
  • Firstpage
    145
  • Lastpage
    152
  • Abstract
    Stack Smashing Protector (SSP), Address-Space Layout Randomization (ASLR) and Non-executable (NX) are techniques for defending systems against buffer overflow attacks but not limited to them. These mechanism are available in modern operating systems like Android, GNU/Linux and Windows. Unfortunately, to keep up with the rapidly evolving landscape of cyber-security it is necessary to reassess the effectiveness of these protection techniques to avoid a false sense of security. This paper assess the effectiveness of these techniques against stack buffer overflow exploitation. Our study indicates that the SSP technique is the most effective against stack buffer overflows. On forking servers, the ASLR technique is almost useless on 32-bit architectures due to the limited entropy provided by the size of the address space. The recently proposed technique Renew SSP, which is an improvement of the well known SSP, outperforms the original SSP in all the cases, it is highly effective against the dangerous byte-for-byte attack and on systems with low secret entropy as x86 and ARM.
  • Keywords
    Android (operating system); ARM; ASLR technique; Android; GNU/Linux; NX; Renew SSP; SSP technique; Windows; address space layout randomization; buffer overflow attacks; byte-for-byte attack; cyber security; entropy; forking servers; operating systems; stack buffer overflow exploitation; stack smashing protector; Computer crashes; Entropy; Force; Layout; Libraries; Payloads; Servers;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Network Computing and Applications (NCA), 2014 IEEE 13th International Symposium on
  • Conference_Location
    Cambridge, MA
  • Print_ISBN
    978-1-4799-5392-9
  • Type

    conf

  • DOI
    10.1109/NCA.2014.28
  • Filename
    6924219