The Community for Technology Leaders
2011 Sixth International Conference on Availability, Reliability and Security (2011)
Vienna, Austria
Aug. 22, 2011 to Aug. 26, 2011
ISBN: 978-0-7695-4485-4
pp: 175-182
Computing systems continue to be plagued by malicious corruption of instructions and data. Buffer overflows, in particular, are often employed to disrupt the control flow of vulnerable processes. Existing methods of protection against these attacks operate by detecting corruption after it has taken place or by ensuring that if corruption has taken place, it cannot be used to hijack a process' control flow. These methods thus still allow the corruption of control data to occur but, rather than being subverted, the process may terminate or take some other defined error. Few methods have attempted to prevent the corruption of control data, and those that have only focused on preventing the corruption of the return address. We propose the use of multiple memory segments to support multiple stacks, heaps, bss, and data sections per process with the goal of segregating control and non-control data. By segregating these different forms of data, we can prevent the corruption of control data by overflow and address manipulation of memory allocated for non-control data. We show that the creation of these additional data segments per process can be implemented through modifications to the compiler.
buffer overflow, memory segregation, memory segmentation, memory protection, multiple stacks, multiple heaps

B. G. Roth and E. H. Spafford, "Implicit Buffer Overflow Protection Using Memory Segregation," 2011 Sixth International Conference on Availability, Reliability and Security(ARES), Vienna, Austria, 2011, pp. 175-182.
96 ms
(Ver 3.3 (11022016))