DocumentCode :
2746959
Title :
The implementation of Secure Canary Word for buffer-overflow protection
Author :
Chiamwongpaet, Sirisara ; Piromsopa, Krerk
Author_Institution :
Dept. of Comput. Eng., Chulalongkorn Univ., Bangkok, Thailand
fYear :
2009
fDate :
7-9 June 2009
Firstpage :
56
Lastpage :
61
Abstract :
Chiamwongpaet and Piromsopa introduced secure canary word, an extension of secure bit, as an architectural approach to the protection against buffer-overflow attacks on non-control data (variables and arguments). Secure canary word is based on two existing schemes, secure bit and canary word. The objective of this paper is to propose a new hardware implementation in order to improve the efficiency of secure canary word. To evaluate this design, the hardware simulation is conducted using BOCHS emulator running Linux (Red Hat 6.2) with GCC compiler. Like the prior work, the results confirm that secure canary word can detect buffer-overflow attacks on non-control data. Furthermore, performance is significantly better than the original implementation. This suggests that secure canary word can prevent buffer-overflow attacks on non-control data without any serious performance degradation or storage requirement.
Keywords :
buffer storage; security of data; BOCHS emulator; GCC compiler; Linux; Red Hat 6.2; buffer-overflow attack detection; buffer-overflow protection; hardware simulation; noncontrol data; secure bit; secure canary word; storage requirement; Buffer storage; Computer worms; Data engineering; Degradation; Hardware; Indexing; Linux; Protection; Secure storage; Writing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electro/Information Technology, 2009. eit '09. IEEE International Conference on
Conference_Location :
Windsor, ON
Print_ISBN :
978-1-4244-3354-4
Electronic_ISBN :
978-1-4244-3355-1
Type :
conf
DOI :
10.1109/EIT.2009.5189584
Filename :
5189584
Link To Document :
بازگشت