S-MOVL: Protegendo Sistemas Computacionais contra Ataques de Violação de Memória por meio de Instruções em Hardware

  • Antonio L. Maia Neto UFMG
  • Omar P. Vilela Neto UFMG
  • Fernando M. Q. Pereira UFMG
  • Leonardo B. Oliveira UFMG

Abstract


The C programming language does not prevent ouf-of-bounds memory access and thus gives room to attacks such as buffer overflow and buffer overread. There exist several techniques to secure C programs. Nevertheless, these methods are usually implemented via software and therefore tend to slow down programs and frequently compromise performance of applications. This work aims at presenting a hardware solution able to check bounds efficiently.

References

Bryant, R. and David Richard, O. (2003). Computer systems: a programmer’s perspective. Prentice Hall.

Dhurjati, D., Kowshik, S., and Adve, V. (2006). SAFECode: enforcing alias analysis for weakly typed languages. In ACM SIGPLAN conference on Programming language design and implementation (PLDI ’06), pages 144–157.

Intel Corporation (2013). Intel Architecture Instruction Set Extensions Programing Reference. http://download-software.intel.com/sites/default/files/319433-015.pdf.

Piromsopa, K. and Enbody, R. J. (2006). Secure bit: Transparent, hardware bufferoverflow protection. IEEE Transactions on Dependable and Secure Computing, 3(4):365–376.
Published
2014-11-03
MAIA NETO, Antonio L.; VILELA NETO, Omar P.; PEREIRA, Fernando M. Q.; OLIVEIRA, Leonardo B.. S-MOVL: Protegendo Sistemas Computacionais contra Ataques de Violação de Memória por meio de Instruções em Hardware. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 14. , 2014, Belo Horizonte. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2014 . p. 306-309. DOI: https://doi.org/10.5753/sbseg.2014.20140.

Most read articles by the same author(s)

<< < 1 2