Buffer Overflow Attacks Defending Using A Segment-based Approach


A segment-based non-executable stack approach is proposed and evaluated to defend against stack-based buffer overflow attacks under Windows NT/2000/2003/XP and Intel 32-bit CPUs. A kernel device driver is designed to relocate the application's user-mode stack to the higher address and to modify the effective limit in the code segment descriptor, in order to… (More)

3 Figures and Tables


  • Presentations referencing similar topics