Thwarting stack-based memory safety violations with stack layout randomization스택 레이아웃 랜덤화를 통한 메모리 안전성 위반 방지

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 260
  • Download : 0
Stack-based memory errors have been a serious source of software vulnerabilities. Although there is a wide spectrum of stack memory defenses proposed, most of them provide limited protection focusing on out-of-bound memory errors or involve unacceptable performance overhead. In this thesis, we explore the feasibility of byte-granularity stack layout randomization and propose SaVioR-E, efficient and comprehensive stack protection. We achieve it through three techniques: (1) isolating out-of-bound-unsafe stack objects, (2) random allocation of stack frames, and (3) introducing byte-granularity randomization by breaking the natural alignment of stack objects. SaVioR-E was implemented on the LLVM compiler infrastructure and evaluated using the SPEC CPU2006 benchmark suite and the Nginx web server. A security analysis was conducted to evaluate the effectiveness of SaVioR-E. The evaluation demonstrates SaVioR-E imposes 22% run-time overhead while achieving adequate legacy compatibility.
Advisors
Kang, Brent Byunghoonresearcher강병훈researcher
Description
한국과학기술원 :정보보호대학원,
Publisher
한국과학기술원
Issue Date
2021
Identifier
325007
Language
eng
Description

학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2021.2,[iv, 25 p. :]

Keywords

Byte-granularity randomization▼astack layout randomization▼aprobabilistic memory safety▼astatic instrumentation▼amemory protection; 바이트 단위 랜덤화▼a스택 레이아웃 랜덤화▼a확률론적 메모리 안전성▼a정적 인스트루멘테이션▼a메모리 보호 기법

URI
http://hdl.handle.net/10203/296187
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=948624&flag=dissertation
Appears in Collection
IS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0