Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2002.9C.4.453

Improving Compiler to Prevent Buffer Overflow Attack  

Kim, Jong-Ewi (Information Communication, Graduate School of Ajou University)
Lee, Seong-Uck (Information Communication, Graduate School of Ajou University)
Hong, Man-Pyo (Information Communication, Graduate School of Ajou University)
Abstract
Recently, the number of hacking, that use buffer overflow vulnerabilities, are increasing. Although the buffer overflow Problem has been known for a long time, for the following reasons, it continuos to present a serious security threat. There are three defense method of buffer overflow attack. First, allow overwrite but do not allow unauthorized change of control flow. Second, do not allow overwriting at all. Third, allow change of control flow, but prevents execution of injected code. This paper is for allowing overwrites but do not allow unauthorized change of control flow which is the solution of extending compiler. The previous defense method has two defects. First, a program company with overhead because it do much thing before than applying for the method In execution of process. Second, each time function returns, it store return address in reserved memory created by compiler. This cause waste of memory too much. The new proposed method is to extend compiler, by processing after compiling and linking time. To complement these defects, we can reduce things to do in execution time. By processing additional steps after compile/linking time and before execution time. We can reduce overhead.
Keywords
buffer overflow; array bounds; Information Security;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang, 'Stackguard : Automatic adaptive detection and prevention of buffer-overflow attacks,' In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, pp.63-78, January, 1998
2 Aleph One, 'Smashing the Stack for fun and profit', Phrack Magazine, 49(14), 1998
3 Graham Glass, King Abies, 'UNIX System V Release 4, Programmers Guide : ANSI C and Programming Support Tools, Executable and Linkable Format (ELF), Tools Interface Standards (TIS), Portable Formats Specication' Version 1.1, Prentice Hall, 1992
4 PLUS(포항공대 유닉스 보안 연구회), 'Security PLUS for UNIX', 영진출판사, 2000
5 Tzi-cker Chiueh,Fu-Hau Hsu, 'RAD : A Compile-Time Solution to Buffer Overflow Attack,' Proceedings of The 21st IEEE International Conference on DISTRIBUTED COMPUTING SYSTEM 16-19 April 2001, p.409, 2001   DOI
6 김종의, 이성욱, 홍만표, '컴파일러 확장을 이용한 효율적인 버퍼오버플로우 공격 방지 기법', 정보과학회, 2001년도 가을 학술발표, 2001   과학기술학회마을