메뉴 건너뛰기




Volumn 55, Issue 10, 2006, Pages 1271-1285

SmashGuard: A hardware solution to prevent security attacks on the function return Address

Author keywords

Buffer overflow; Function return address; Hardware stack

Indexed keywords

BUFFER STORAGE; COMPUTER AIDED INSTRUCTION; COMPUTER PRIVACY; DATA COMMUNICATION SYSTEMS; SERVERS;

EID: 33748501504     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2006.166     Document Type: Article
Times cited : (74)

References (61)
  • 1
    • 33748509415 scopus 로고    scopus 로고
    • "AMD Chips Include New Buffer Overflow Protection"
    • AMD
    • AMD, "AMD Chips Include New Buffer Overflow Protection," http://www.computerweekly.com/Article127571.htm, 2004.
    • (2004)
  • 2
    • 33748492657 scopus 로고    scopus 로고
    • "Execute Disable (XD) Bit"
    • Intel
    • Intel, "Execute Disable (XD) Bit," http://www.intel.com/business/bss/ infrastructure/security/xdbit.htm, 2001.
    • (2001)
  • 3
    • 33748497918 scopus 로고    scopus 로고
    • "AntiVirusNX Technology"
    • T. Corporation
    • T. Corporation, "AntiVirusNX Technology," http://www.transmeta.com/officeon/antivirusnx.html, 2004.
    • (2004)
  • 4
    • 33748505754 scopus 로고    scopus 로고
    • "Microsoft Windows XP SP2 Data Execution Prevention"
    • Microsoft
    • Microsoft, "Microsoft Windows XP SP2 Data Execution Prevention," http://www.microsoft.com/technet/prodtechnol/ winxppro/maintain/sp2mempr.mspx, 2004.
    • (2004)
  • 5
    • 0006100649 scopus 로고    scopus 로고
    • "Smashing the Stack for Fun and Profit"
    • Aleph1, Nov
    • Aleph1, "Smashing the Stack for Fun and Profit," Phrack Magazine, vol. 7, no. 49, Nov. 1996, http://www.phrack.org/show.php?p =49&a=14.
    • (1996) Phrack Magazine , vol.7 , Issue.49
  • 6
    • 33748497917 scopus 로고    scopus 로고
    • "CERT Incident Note IN-2001-08 Code Red Worm Exploiting Buffer Overflow in IIS Indexing Service DLL"
    • CERT Coordination Center, June
    • CERT Coordination Center, "CERT Incident Note IN-2001-08 Code Red Worm Exploiting Buffer Overflow in IIS Indexing Service DLL," http:// www.cert.org/incident_notes/IN-2001-08.html, June 2001.
    • (2001)
  • 7
    • 33748515550 scopus 로고    scopus 로고
    • "CERT Incident Note IN-2001-09 Code Red II: Another Worm Exploiting Buffer Overflow In IIS Indexing Service DLL"
    • CERT Coordination Center, Aug
    • CERT Coordination Center, "CERT Incident Note IN-2001-09 Code Red II: Another Worm Exploiting Buffer Overflow In IIS Indexing Service DLL," http://www.cert.org/incident_notes/IN-2001-09.html, Aug. 2001.
    • (2001)
  • 8
    • 2442611534 scopus 로고    scopus 로고
    • "CERT Advisory CA-2003-20 W32/Blaster Worm"
    • CERT Coordination Center, Aug
    • CERT Coordination Center, "CERT Advisory CA-2003-20 W32/Blaster Worm," http://www.cert.org/advisories/CA-2003-20.html, Aug. 2003.
    • (2003)
  • 9
    • 33748505107 scopus 로고    scopus 로고
    • "W32/Nachi-A"
    • Sophos Virus Analysis, Aug
    • Sophos Virus Analysis, "W32/Nachi-A," http://www.sophos.com/virusinfo/ analyses/w32nachia.html, Aug. 2003.
    • (2003)
  • 10
    • 33748490939 scopus 로고    scopus 로고
    • "W32/Sasser"
    • Sophos Virus Analysis, May
    • Sophos Virus Analysis, "W32/Sasser," http://www.eeye.com/html/research/ advisories/AD20040501.html, May 2004.
    • (2004)
  • 11
    • 33748504889 scopus 로고    scopus 로고
    • "CERT Advisory CA-2001-13 Buffer Overflow in IIS Indexing Service DLL"
    • CERT Coordination Center, June
    • CERT Coordination Center, "CERT Advisory CA-2001-13 Buffer Overflow in IIS Indexing Service DLL," http://www.cert.org/advisories/ CA-2001-13.html, June 2001.
    • (2001)
  • 12
    • 33748493887 scopus 로고    scopus 로고
    • "CERT Vulnerability Note VU 568148 Microsoft Windows RPC Vulnerable to Buffer Overflow"
    • CERT Coordination Center, July
    • CERT Coordination Center, "CERT Vulnerability Note VU 568148 Microsoft Windows RPC Vulnerable to Buffer Overflow," http://www.kb.cert.org/vuls/ id/568148, July 2003.
    • (2003)
  • 13
    • 33748487700 scopus 로고    scopus 로고
    • "CERT Coordination Center Advisories for 2002"
    • CERT Coordination Center
    • CERT Coordination Center, "CERT Coordination Center Advisories for 2002," http://www.cert.org/advisories/#2002, 2002.
    • (2002)
  • 14
    • 33748500924 scopus 로고    scopus 로고
    • "SANS/FBI Top 20 List, the Twenty Most Critical Internet Security Vulnerabilities"
    • SANS Institute
    • SANS Institute, "SANS/FBI Top 20 List, the Twenty Most Critical Internet Security Vulnerabilities," http://www.sans.org/top20/ oct02.php, 2002.
    • (2002)
  • 15
    • 33748516461 scopus 로고    scopus 로고
    • "CERT Coordination Center Advisories for 2003"
    • CERT Coordination Center
    • CERT Coordination Center, "CERT Coordination Center Advisories for 2003," http://www.cert.org/advisories/#2003, 2003.
    • (2003)
  • 16
    • 33748502838 scopus 로고    scopus 로고
    • "SANS Top 20 List, The Twenty Most Critical Internet Security Vulnerabilities"
    • SANS Institute
    • SANS Institute, "SANS Top 20 List, The Twenty Most Critical Internet Security Vulnerabilities," http://www.sans.org/top20/, 2003.
    • (2003)
  • 17
    • 33748480777 scopus 로고    scopus 로고
    • "Format String Vulnerabilities"
    • Scut, Sept
    • Scut, "Format String Vulnerabilities," http://teso.scene.at/articles/ formatstring, Sept. 2001.
    • (2001)
  • 18
    • 12344288334 scopus 로고    scopus 로고
    • "Format String Attacks"
    • Sept
    • T. Newsham, "Format String Attacks," http://www.lava.net/newsham/ format-string-attacks.pdf, Sept. 2000.
    • (2000)
    • Newsham, T.1
  • 19
    • 26844531642 scopus 로고    scopus 로고
    • "Basic Integer Overflows"
    • Blexim, Dec
    • Blexim, "Basic Integer Overflows," Phrack Magazine, vol. 11, no. 60, Dec. 2002, http://www.phrack.org/show.php?p=60&a=10.
    • (2002) Phrack Magazine , vol.11 , Issue.60
  • 20
    • 33748501153 scopus 로고    scopus 로고
    • "Linux Kernel Patch from the Openwall Project: Non-Executable User Stack"
    • Jan
    • S. Designer, "Linux Kernel Patch from the Openwall Project: Non-Executable User Stack," http://www.openwall.com/linux/README, Jan. 2001.
    • (2001)
    • Designer, S.1
  • 21
    • 33748499445 scopus 로고    scopus 로고
    • The SmashGuard Group, SmashGuard Web Site
    • The SmashGuard Group, SmashGuard Web Site, http://www.smashguard.org/, 2003.
    • (2003)
  • 22
    • 20344393792 scopus 로고    scopus 로고
    • "A Comparison of Publicly Available Tools for Static Intrusion Prevention"
    • Nov
    • J. Wilander and M. Kamkar, "A Comparison of Publicly Available Tools for Static Intrusion Prevention," Proc. Seventh Nordic Workshop Secure IT Systems, pp. 68-84, Nov. 2002.
    • (2002) Proc. Seventh Nordic Workshop Secure IT Systems , pp. 68-84
    • Wilander, J.1    Kamkar, M.2
  • 25
    • 85084164558 scopus 로고    scopus 로고
    • "Statically Detecting Likely Buffer Overflow Vulnerabilities"
    • Aug
    • D. Larochelle and D. Evans, "Statically Detecting Likely Buffer Overflow Vulnerabilities," Proc. 10th USENIX Security Symp., pp. 177-190, Aug. 2001.
    • (2001) Proc. 10th USENIX Security Symp. , pp. 177-190
    • Larochelle, D.1    Evans, D.2
  • 29
    • 84862209017 scopus 로고    scopus 로고
    • "Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits"
    • Aug
    • S. Bhatkar, D.C. DuVarney, and R. Sekar, "Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits," Proc. 12th USENIX Security Symp., pp. 105-120, Aug. 2003.
    • (2003) Proc. 12th USENIX Security Symp. , pp. 105-120
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 30
    • 33748487283 scopus 로고    scopus 로고
    • The PaX Team, PaX
    • The PaX Team, PaX, http://pageexec.virtualave.net/, 2001.
    • (2001)
  • 31
    • 2642520196 scopus 로고    scopus 로고
    • "A Binary Rewriting Defense against Stack Based Buffer Overflow Attacks"
    • June
    • M. Prasad and T. Chiueh, "A Binary Rewriting Defense against Stack Based Buffer Overflow Attacks," Proc. Usenix Ann. Technical Conf., General Track, pp. 211-224, June 2003.
    • (2003) Proc. Usenix Ann. Technical Conf., General Track , pp. 211-224
    • Prasad, M.1    Chiueh, T.2
  • 32
    • 33748508315 scopus 로고    scopus 로고
    • "Visual C++ Option to Tighten Security"
    • Microsoft
    • Microsoft, "Visual C++ Option to Tighten Security," http:// archive.devx.com/security/bestdefense/2001/mh0301/mh03011.asp, 2001.
    • (2001)
  • 34
    • 34248505656 scopus 로고    scopus 로고
    • "Protecting Systems from Stack Smashing Attacks with Stack-Guard"
    • May
    • C. Cowan, S. Beattie, R.F. Day, C. Pu, P. Wagle, and E. Walthinsen, "Protecting Systems from Stack Smashing Attacks with Stack-Guard," Proc. Fifth Linux Expo, May 1999, http://www.cse.ogi.edu/DISC/projects/ immunix/lexpo.ps.gz.
    • (1999) Proc. Fifth Linux Expo
    • Cowan, C.1    Beattie, S.2    Day, R.F.3    Pu, C.4    Wagle, P.5    Walthinsen, E.6
  • 35
    • 17644393012 scopus 로고    scopus 로고
    • "Bypassing StackGuard and StackShield"
    • Bulba and Kil3r, May
    • Bulba and Kil3r, "Bypassing StackGuard and StackShield," Phrack Magazine, vol. 10, no. 56, May 2000, http://www.phrack.org/ show.php?p=56&a=5.
    • (2000) Phrack Magazine , vol.10 , Issue.56
  • 36
    • 84860103711 scopus 로고    scopus 로고
    • "StackShield: A 'Stack Smashing' Technique Protection Tool for Linux"
    • Vendicator, Jan
    • Vendicator, "StackShield: A 'Stack Smashing' Technique Protection Tool for Linux," http://www.angelfire.com/sk/stackshield/download.html, Jan. 2001.
    • (2001)
  • 38
    • 33748494346 scopus 로고    scopus 로고
    • "GCC Extension for Protecting Applications from Stack-Smashing Attacks"
    • Apr
    • H. Etoh, "GCC Extension for Protecting Applications from Stack-Smashing Attacks," IBM Research, http://www.trl.ibm.com/projects/security/ssp/, Apr. 2003.
    • (2003) IBM Research
    • Etoh, H.1
  • 39
    • 33748510667 scopus 로고    scopus 로고
    • The OpenBSD Project, Apr
    • The OpenBSD Project, http://www.openbsd.org/, Apr. 2003.
    • (2003)
  • 41
    • 33748510270 scopus 로고    scopus 로고
    • "OpenSSL"
    • Various
    • Various, "OpenSSL," http://www.openssl.org/, 2004.
    • (2004)
  • 43
    • 0013294751 scopus 로고    scopus 로고
    • "FreeBSD Stack Integrity Patch"
    • A. Snarskii, "FreeBSD Stack Integrity Patch," ftp://ftp.lucky.net/pub/ unix/local/libc-letter, 1997.
    • (1997)
    • Snarskii, A.1
  • 44
    • 33748498337 scopus 로고    scopus 로고
    • "Libparanoia"
    • Apr
    • A. Snarskii, "Libparanoia," http://www.lexa.ru/snar/libparanoia/, Apr. 2000.
    • (2000)
    • Snarskii, A.1
  • 45
    • 21644485343 scopus 로고    scopus 로고
    • "Libsafe: Protecting Critical Elements of Stacks"
    • technical report, Bell Labs, Lucent Technologies, Murray Hill, N.J., Dec
    • A. Baratloo, T.K. Tsai, and N. Singh, "Libsafe: Protecting Critical Elements of Stacks," technical report, Bell Labs, Lucent Technologies, Murray Hill, N.J., Dec. 1999, http://www.bell-labs.com/org/11356/ libsafe.html.
    • (1999)
    • Baratloo, A.1    Tsai, T.K.2    Singh, N.3
  • 46
    • 85084160891 scopus 로고    scopus 로고
    • "Transparent Run-Time Defense against Stack Smashing Attacks"
    • June
    • A. Baratloo, N. Singh, and T. Tsai, "Transparent Run-Time Defense against Stack Smashing Attacks," Proc. USENIX Ann. Technical Conf., pp. 251-262, June 2000.
    • (2000) Proc. USENIX Ann. Technical Conf. , pp. 251-262
    • Baratloo, A.1    Singh, N.2    Tsai, T.3
  • 47
    • 0012528068 scopus 로고    scopus 로고
    • "Libsafe 2.0: Detection of Format String Vulnerability Exploits"
    • Technical Report ALR-2001-019, Avaya Labs, Avaya Inc., Basking Ridge, N.J., Aug
    • T. Tsai and N. Singh, "Libsafe 2.0: Detection of Format String Vulnerability Exploits," Technical Report ALR-2001-019, Avaya Labs, Avaya Inc., Basking Ridge, N.J., Aug. 2001, http:// www.research.avayalabs.com/techreport/ALR-2001-019-paper.pdf.
    • (2001)
    • Tsai, T.1    Singh, N.2
  • 49
    • 85084163372 scopus 로고    scopus 로고
    • "StackGhost: Hardware Facilitated Stack Protection"
    • Aug
    • M. Frantzen and M. Shuey, "StackGhost: Hardware Facilitated Stack Protection," Proc. 10th USENIX Security Symp., pp. 55-66, Aug. 2001.
    • (2001) Proc. 10th USENIX Security Symp. , pp. 55-66
    • Frantzen, M.1    Shuey, M.2
  • 50
    • 33748505753 scopus 로고    scopus 로고
    • "Reply to Non-Executable Stack Patch"
    • Aug
    • L. Torvalds, "Reply to Non-Executable Stack Patch," http://old.lwn.net/ 1998/0806/a/linus-noexec.html, Aug. 1998.
    • (1998)
    • Torvalds, L.1
  • 51
    • 33748517719 scopus 로고    scopus 로고
    • GNU Compiler Collection Internals
    • GNU Compiler Collection Internals, http://gcc.gnu.org/onlinedocs/gccint/ Trampolines.html, 2004.
    • (2004)
  • 52
    • 33748485487 scopus 로고    scopus 로고
    • The OpenBSD 3.3 Apr
    • The OpenBSD 3.3, http://www.openbsd.org/33.html, Apr. 2003.
    • (2003)
  • 56
    • 33748513563 scopus 로고
    • "Safe C Compiler (SCC)"
    • June
    • T. Austin, S. Breach, and G. Sohi, "Safe C Compiler (SCC)," http:// www.cs.wisc.edu/austin/scc.html, June 1994.
    • (1994)
    • Austin, T.1    Breach, S.2    Sohi, G.3
  • 59
    • 18744394459 scopus 로고    scopus 로고
    • "SimpleScalar LLC"
    • T. Austin, "SimpleScalar LLC," http://www.simplescalar.com/, 2001.
    • (2001)
    • Austin, T.1
  • 60
    • 33748501802 scopus 로고    scopus 로고
    • CERT Coordination Center, CERT Coordination Center Statistics 1988-2002
    • CERT Coordination Center, CERT Coordination Center Statistics 1988-2002, http://www.cert.org/stats/cert-stats.html, 2004.
    • (2004)
  • 61
    • 33748497181 scopus 로고    scopus 로고
    • CERT Coordination Center, CERT Coordination Center Incident and Vulnerability Trends
    • CERT Coordination Center, CERT Coordination Center Incident and Vulnerability Trends, http://www.cert.org/present/cert-overview-trends/, 2003.
    • (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.