Title :
Extended Protection against Stack Smashing Attacks without Performance Loss
Author :
Younan, Yves ; Pozza, Davide ; Piessens, Frank ; Joosen, Wouter
Author_Institution :
Dept. of Comput. Sci., Katholieke Univ. Leuven
Abstract :
In this paper we present an efficient countermeasure against stack smashing attacks. Our countermeasure does not rely on secret values (such as canaries) and protects against attacks that are not addressed by state-of-the-art countermeasures. Our technique splits the standard stack into multiple stacks. The allocation of data types to one of the stacks is based on the chances that a specific data element is either a target of attacks and/or an attack vector. We have implemented our solution in a C-compiler for Linux. The evaluation shows that the overhead of using our countermeasure is negligible
Keywords :
C language; Linux; program compilers; security of data; C-compiler; Linux; data type allocation; extended attack protection; secret values; stack smashing attack; Buffer overflow; Computer science; Data security; Databases; Libraries; Linux; NIST; Operating systems; Performance loss; Protection;
Conference_Titel :
Computer Security Applications Conference, 2006. ACSAC '06. 22nd Annual
Conference_Location :
Miami Beach, FL
Print_ISBN :
0-7695-2716-7
DOI :
10.1109/ACSAC.2006.27