Buffer Overflow Attacks Defending Using A Segment-based Approach

Abstract

A segment-based non-executable stack approach is proposed and evaluated to defend against stack-based buffer overflow attacks under Windows NT/2000/2003/XP and Intel 32-bit CPUs. A kernel device driver is designed to relocate the application's user-mode stack to the higher address and to modify the effective limit in the code segment descriptor, in order to… (More)

3 Figures and Tables

Topics

  • Presentations referencing similar topics