DocumentCode
2746959
Title
The implementation of Secure Canary Word for buffer-overflow protection
Author
Chiamwongpaet, Sirisara ; Piromsopa, Krerk
Author_Institution
Dept. of Comput. Eng., Chulalongkorn Univ., Bangkok, Thailand
fYear
2009
fDate
7-9 June 2009
Firstpage
56
Lastpage
61
Abstract
Chiamwongpaet and Piromsopa introduced secure canary word, an extension of secure bit, as an architectural approach to the protection against buffer-overflow attacks on non-control data (variables and arguments). Secure canary word is based on two existing schemes, secure bit and canary word. The objective of this paper is to propose a new hardware implementation in order to improve the efficiency of secure canary word. To evaluate this design, the hardware simulation is conducted using BOCHS emulator running Linux (Red Hat 6.2) with GCC compiler. Like the prior work, the results confirm that secure canary word can detect buffer-overflow attacks on non-control data. Furthermore, performance is significantly better than the original implementation. This suggests that secure canary word can prevent buffer-overflow attacks on non-control data without any serious performance degradation or storage requirement.
Keywords
buffer storage; security of data; BOCHS emulator; GCC compiler; Linux; Red Hat 6.2; buffer-overflow attack detection; buffer-overflow protection; hardware simulation; noncontrol data; secure bit; secure canary word; storage requirement; Buffer storage; Computer worms; Data engineering; Degradation; Hardware; Indexing; Linux; Protection; Secure storage; Writing;
fLanguage
English
Publisher
ieee
Conference_Titel
Electro/Information Technology, 2009. eit '09. IEEE International Conference on
Conference_Location
Windsor, ON
Print_ISBN
978-1-4244-3354-4
Electronic_ISBN
978-1-4244-3355-1
Type
conf
DOI
10.1109/EIT.2009.5189584
Filename
5189584
Link To Document