Back to Search
Start Over
StackGuard+$\text{StackGuard}^+$: Interoperable alternative to canary‐based protection of stack smashing.
- Source :
-
Electronics Letters (Wiley-Blackwell) . Oct2024, Vol. 60 Issue 19, p1-5. 5p. - Publication Year :
- 2024
-
Abstract
- This paper introduces a novel software‐based approach to enhancing stack smashing protection in C/C++ applications, specifically targeting return‐oriented programming attacks, which remain a significant threat to firmware and software security. Traditional canary‐based protections are vulnerable to brute‐force and format string attacks. Additionally, many stack protection mechanisms require access to the source code or recompilation, complicating the security of existing binaries. This paper proposes a new method, aptly named StackGuard+$\text{StackGuard}^+$, that modifies the canary‐based protection mechanism by altering the code responsible for canary insertion and verification. This change ensures the integrity of the return address while maintaining the original code size, allowing for seamless interoperability without the need for recompilation or additional hardware. The approach can be automated using a Python script, which modifies existing canary‐based binaries with only 26 bytes of machine code on the ×$\times$86‐64 platform. Moreover, this approach can be easily adapted to other platforms, including ×$\times$86 and ARM64. [ABSTRACT FROM AUTHOR]
- Subjects :
- *COMPUTER software security
*SOURCE code
*CANARIES
*SCRIPTS
*HARDWARE
Subjects
Details
- Language :
- English
- ISSN :
- 00135194
- Volume :
- 60
- Issue :
- 19
- Database :
- Academic Search Index
- Journal :
- Electronics Letters (Wiley-Blackwell)
- Publication Type :
- Academic Journal
- Accession number :
- 180217541
- Full Text :
- https://doi.org/10.1049/ell2.13310