TITLE

ENHANCING THE STACK SMASHING PROTECTION IN THE GCC

AUTHOR(S)
Seredinschi, Dragoş-Adrian; Sterca, Adrian
PUB. DATE
December 2011
SOURCE
Studia Universitatis Babes-Bolyai, Informatica;2011, Vol. 56 Issue 4, p95
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The paper addresses the problem of stack smashing or stack overflows in modern operating systems. We focus on a security solution for this problem, namely compiler generated canary protection and, to be more specific, we consider the Stack Smashing Protector (SSP) present in the most popular C compiler, the GCC. We first analyze the limitations of the GCCs SSP and then present three improvements that will harden the security offered by the SSP making an attackers attempt more difficult. All improvements refer to the most recent version of GCC, 4.6.2.
ACCESSION #
70291555

 

Related Articles

  • Libjit Linear Scan: a Model for Fast and Efficient Compilation. Kononenko, K. // International Review on Modelling & Simulations;Oct2010, Vol. 3 Issue 5, p1035 

    We present a software package for advanced just-in-time compilation. We solve this task using a new model. The efficiency of the model has been demonstrated in an experiment where a problem has been solved using three different algorithms. All three algorithms have shown that only this model...

  • RESIZABLE TRANSLATION STORAGE BUFFERS. SAGAHYROON, ASSIM; MOHAMED, AHMED H. // Journal of Circuits, Systems & Computers;Apr2006, Vol. 15 Issue 2, p169 

    A translation lookaside buffer (TLB) is a high-speed associative cache of recently used virtual-to-physical address translations. The operating system can deal with a TLB miss through software trap handling. A possible technique for such software trap handling uses translation storage buffers...

  • One size only: XXXL.  // Accountancy;Oct2001, Vol. 128 Issue 1298, p56 

    This article introduces the Windows XP operating software from Microsoft Corp. Microsoft announces that Windows XP operating software is the best operating system the company has ever built. Hence, on October 25, 2001, the operating software will be available worldwide. Windows XP demands huge...

  • Vulnerabilities of network OS and mitigation with state-based permission system. Noh, Jiseong; Lee, Seunghyeon; Park, Jaehyun; Shin, Seungwon; Kang, Brent Byunghoon // Security & Communication Networks;Sep2016, Vol. 9 Issue 13, p1971 

    The advancement of software defined networking (SDN) is redefining traditional computer networking architecture. The role of the control plane of SDN is of such importance that SDNs are referred to as network operating systems (OSs). However, the robustness and security of the network OS has...

  • Fatores discriminantes no grau de satisfação de estudantes de Administração. Quevedo-Silva, Filipe; de Oliveira Lima-Filho, Dario // Revista de Economia e Administração;jan-mar2012, Vol. 11 Issue 1, p28 

    The goal of this paper was to analyze the determinants of the satisfaction of Business Administration students in Campo Grande-MS with the course they take. A quantitative-descriptive cross sectional study was performed, involving 281 undergraduate students. The study was undertaken with a 95%...

  • Comportamento dos Dez Maiores Bancos Brasileiros Durante a Crise do Subprime: uma Análise por Meio de Indicadores Contábeis. de Souza Gonçalves, Rodrigo; de Lima Tavares, Adilson; Ximenes, Pedro Maia; da Silva, Rosane Maria Pio // Revista de Educação e Pesquisa em Contabilidade;abr-jun2012, Vol. 6 Issue 2, p170 

    O presente artigo tem por objetivo demonstrar o comportamento dos dez maiores bancos brasileiros no período de junho de 2008 a de setembro de 2009, a partir da análise de indicadores contábeis. Para tanto, foram calculados 16 índices com periodicidade trimestral, extraídos a...

  • LATEST LINUX KERNEL IS A ONE-STOP SOLUTION.  // Electronic Design;3/29/2004, Vol. 52 Issue 7, p38 

    This article focuses on the Linux 2.6 which seriously impacts the system and embedded spaces with a wide range of improvements at both ends of the spectrum. It eliminates the need for various Linux configurations, providing an incredible upgrade path within a single architecture. As with most...

  • Command line secrets. Bell, Les // Australian PC User;Dec2003, Vol. 15 Issue 12, p82 

    Explores the command line esoterica in the Linux bash command line shell. Method of putting multiple commands on one line; Technique of setting up aliases to reduce typing; Example of including the output of one command inside another by using backquotes.

  • LINUX Q&A. Hilvert, John // Australian PC User;Dec2003, Vol. 15 Issue 12, p94 

    Presents tips on installing the Lindows operating system.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics