Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic

@inproceedings{Younan2006EfficientPA,
  title={Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic},
  author={Yves Younan and Wouter Joosen and Frank Piessens},
  booktitle={ICICS},
  year={2006}
}
Bugs in dynamic memory management, including for instance heap-based buffer overflows and dangling pointers, are an important source of vulnerabilities in C and C++. Overwriting the management information of the memory allocation library is often a source of attack on these vulnerabilities. All existing countermeasures with low performance overhead rely on magic values or canaries. A secret value is placed before a crucial memory location and by monitoring whether the value has changed… CONTINUE READING
BETA

References

Publications referenced by this paper.
SHOWING 1-10 OF 42 REFERENCES

The malloc maleficarum

  • P. Phantasmagoria
  • Bugtraq mailinglist
  • 2005
1 Excerpt

GNU C library

  • Free Software Foundation
  • http://www.gnu.org/software/libc
  • 2004
3 Excerpts

Similar Papers

Loading similar papers…