Skip to main content

All Questions

2votes
0answers
136views

Mobile processors with hardware support for efficient bounds checking

Are there any mobile or embedded processors that provide hardware support for efficient bounds checking? Intel's newest x86 processors provide MPX, which enables compilers to add automatic bounds ...
D.W.'s user avatar
  • 100k
2votes
1answer
258views

ASCII Armoring in a little endian system

With regard to the question: How does ASCII-Armoring help to prevent buffer-overflow attacks?: How does the armored region prevent an attack? If the most significant byte of the return address is ...
Bush's user avatar
  • 347
4votes
2answers
3kviews

Heap canaries, to protect function pointers in heap objects

I'm wondering if anyone has previously proposed, evaluated, or deployed the following measure to harden systems against heap-based buffer overruns: basically, stack canaries, but applied before ...
D.W.'s user avatar
  • 100k
0votes
1answer
532views

libraries alternative to gcc stack-protector / fortity source feature on linux

is there external library/approach/whatever to add canary protection (stack-protector equivalent) extra buffer boundary check (fortity source equivalent) on a C software without using glibc / gcc ...
boos's user avatar
  • 1,086
5votes
1answer
1kviews

Defend against Blind ROP

At IEEE Security & Privacy, the blind return-oriented programming attack (blind ROP) was just introduced. In some sense, this is just another variation on ROP attacks -- but the blind ROP attack ...
D.W.'s user avatar
  • 100k
2votes
1answer
779views

Bounds checking using Intel's MPX

Intel has recently added new instructions to their instruction set to support bounds checking. Intel calls them the Memory Protection Extensions (MPX), and they are described in Chapter 9 of this ...
D.W.'s user avatar
  • 100k
11votes
3answers
4kviews

How does ASCII-Armoring help to prevent buffer-overflow attacks?

I was reading about return-to-libc attacks at Wikipedia. According to what I read and understood from the article, ASCII armoring means that binary data is converted into ASCII values by grouping ...
Karan's user avatar

close