Stacklock with simple FSM

Dongkyun Ahn, Gyungho Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

With a wide spread of malicious software attacks, run-time stack has been drawing attention because it is one of the most vulnerable points in computer architecture. Conventional stack layout, in which local variables for user input and control ow data such as return address are saved close to each other, is often the root of the attack vulnerability. This paper proposes a simple ?nite state machine to track usage of stack frame locations at a ?ne granularity of 2-bytes. Such a ?ne grain protection is necessary to distinguish adjacent stack frame locations, which allows detecting abnormal memory operations even in real mode running of a boot loader. The proposed scheme guarantees 2-byte granularity for preventing malicious writes in the stack using small additional memory space for the ?nite state machine.1

Original languageEnglish
Title of host publicationProceedings of 2009 IEEE International Conference on Electro/Information Technology, EIT 2009
Pages46-51
Number of pages6
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2009 IEEE International Conference on Electro/Information Technology, EIT 2009 - Windsor, ON, Canada
Duration: 2009 Jun 72009 Jun 9

Publication series

NameProceedings of 2009 IEEE International Conference on Electro/Information Technology, EIT 2009

Other

Other2009 IEEE International Conference on Electro/Information Technology, EIT 2009
Country/TerritoryCanada
CityWindsor, ON
Period09/6/709/6/9

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Signal Processing
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Stacklock with simple FSM'. Together they form a unique fingerprint.

Cite this