All Questions
Tagged with hardeningbuffer-overflow
7 questions
2votes
0answers
136views
Mobile processors with hardware support for efficient bounds checking
Are there any mobile or embedded processors that provide hardware support for efficient bounds checking? Intel's newest x86 processors provide MPX, which enables compilers to add automatic bounds ...
2votes
1answer
258views
ASCII Armoring in a little endian system
With regard to the question: How does ASCII-Armoring help to prevent buffer-overflow attacks?: How does the armored region prevent an attack? If the most significant byte of the return address is ...
4votes
2answers
3kviews
Heap canaries, to protect function pointers in heap objects
I'm wondering if anyone has previously proposed, evaluated, or deployed the following measure to harden systems against heap-based buffer overruns: basically, stack canaries, but applied before ...
0votes
1answer
532views
libraries alternative to gcc stack-protector / fortity source feature on linux
is there external library/approach/whatever to add canary protection (stack-protector equivalent) extra buffer boundary check (fortity source equivalent) on a C software without using glibc / gcc ...
5votes
1answer
1kviews
Defend against Blind ROP
At IEEE Security & Privacy, the blind return-oriented programming attack (blind ROP) was just introduced. In some sense, this is just another variation on ROP attacks -- but the blind ROP attack ...
2votes
1answer
779views
Bounds checking using Intel's MPX
Intel has recently added new instructions to their instruction set to support bounds checking. Intel calls them the Memory Protection Extensions (MPX), and they are described in Chapter 9 of this ...
11votes
3answers
4kviews
How does ASCII-Armoring help to prevent buffer-overflow attacks?
I was reading about return-to-libc attacks at Wikipedia. According to what I read and understood from the article, ASCII armoring means that binary data is converted into ASCII values by grouping ...