Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Hardware stack design: Towards an effective defence against frame pointer overwrite attacks

Full metadata record
DC Field Value Language
dc.contributor.authorPark, Yongsu-
dc.contributor.authorLee, Younho-
dc.contributor.authorKim, Heeyoul-
dc.contributor.authorLee, Gil-Joo-
dc.contributor.authorKim, Il-Hee-
dc.date.accessioned2022-12-21T10:11:40Z-
dc.date.available2022-12-21T10:11:40Z-
dc.date.created2022-08-26-
dc.date.issued2006-10-
dc.identifier.issn0302-9743-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/180926-
dc.description.abstractCurrently, a buffer overflow attack is one of the most serious and widely utilized assaults in computer systems. Defense methods against this attack can be classified as three: compiler modification, system software modification, and hardware modification. Among them, most of the cases, hardware modification methods aim at detecting or tolerating alternation of return addresses in the memory stack. However, to the best of our knowledge, the previous methods cannot defend against frame pointer overwrite attacks, where an adversary can control the execution at his/her will by modifying the saved frame pointers in the stack. In this paper, we present a new reliable hardware stack to detect alternation of saved frame pointers as well as return addresses. We show that the proposed method can defend against both frame pointer overwrite attacks and stack smashing attacks.-
dc.language영어-
dc.language.isoen-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.titleHardware stack design: Towards an effective defence against frame pointer overwrite attacks-
dc.typeArticle-
dc.contributor.affiliatedAuthorPark, Yongsu-
dc.identifier.doi10.1007/11908739_19-
dc.identifier.scopusid2-s2.0-33845235435-
dc.identifier.wosid000241630900019-
dc.identifier.bibliographicCitationADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, v.4266, pp.268 - 277-
dc.relation.isPartOfADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS-
dc.citation.titleADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS-
dc.citation.volume4266-
dc.citation.startPage268-
dc.citation.endPage277-
dc.type.rimsART-
dc.type.docTypeArticle; Proceedings Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordAuthorcomputer security-
dc.subject.keywordAuthorbuffer overflow attack-
dc.subject.keywordAuthorcomputer architecture-
dc.identifier.urlhttps://link.springer.com/chapter/10.1007/11908739_19-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Park, Yong su photo

Park, Yong su
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE