2017
DOI: 10.1007/978-3-319-59870-3_6
|View full text |Cite
|
Sign up to set email alerts
|

SafeStack $$^+$$ : Enhanced Dual Stack to Combat Data-Flow Hijacking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…The boundary detection method sets flags at the tail of the heap and the stack, and determines whether the overflow attack occurs by checking the flags. SafeStack(+) [14] can diagnose and patch stack-based buffer overflow vulnerabilities automatically. It locates data flow sensitive variables on the unsafe stack that could potentially affect evaluation of branching conditions, and adds canaries of random sizes and values to them to detect malicious overwriting.…”
Section: Boundary Detectionmentioning
confidence: 99%
“…The boundary detection method sets flags at the tail of the heap and the stack, and determines whether the overflow attack occurs by checking the flags. SafeStack(+) [14] can diagnose and patch stack-based buffer overflow vulnerabilities automatically. It locates data flow sensitive variables on the unsafe stack that could potentially affect evaluation of branching conditions, and adds canaries of random sizes and values to them to detect malicious overwriting.…”
Section: Boundary Detectionmentioning
confidence: 99%