Protection against Buffer Overflow Attacks via Dynamic Binary Translation

Buffer overflow attacks are serious security threats to modern computer systems. Prior works against buffer overflow attacks may require users to patch the source codes, rebuild programs, modify the operating system or the augments of hardware architecture, and thus often result in performance degra...

Full description

Saved in:
Bibliographic Details
Published inReliable and Autonomous Computational Science pp. 305 - 324
Main Authors Chen, Chun-Chung, Hung, Shih-Hao, Lee, Chen-Pang
Format Book Chapter
LanguageEnglish
Published Basel Springer Basel 2010
SeriesAutonomic Systems
Subjects
Online AccessGet full text
ISBN9783034800303
3034800304
DOI10.1007/978-3-0348-0031-0_16

Cover

Abstract Buffer overflow attacks are serious security threats to modern computer systems. Prior works against buffer overflow attacks may require users to patch the source codes, rebuild programs, modify the operating system or the augments of hardware architecture, and thus often result in performance degradation or restricted applicability. This paper proposes to protect a system from buffer overflow attacks with a mechanism based on dynamic binary translation. Our mechanism is capable of recovering corrupted data structures on the stack at runtime by dynamically inserting codes to guard the return address and stack frame pointer, without modification of the source code. We have implemented two tools using dynamic binary translation tools, Pin and QEMU. Experimental results showed that both tools detected buffer overflow attacks in our benchmark programs accurately. With our QEMU-based tool, the performance degradation ranged from 11.2% to 41% for realistic applications, which was 11 times less than a compiler-based solution such as Read-Only RAR. The performance of our mechanism and its applicability on various platforms make it an effective and viable solution for end users.
AbstractList Buffer overflow attacks are serious security threats to modern computer systems. Prior works against buffer overflow attacks may require users to patch the source codes, rebuild programs, modify the operating system or the augments of hardware architecture, and thus often result in performance degradation or restricted applicability. This paper proposes to protect a system from buffer overflow attacks with a mechanism based on dynamic binary translation. Our mechanism is capable of recovering corrupted data structures on the stack at runtime by dynamically inserting codes to guard the return address and stack frame pointer, without modification of the source code. We have implemented two tools using dynamic binary translation tools, Pin and QEMU. Experimental results showed that both tools detected buffer overflow attacks in our benchmark programs accurately. With our QEMU-based tool, the performance degradation ranged from 11.2% to 41% for realistic applications, which was 11 times less than a compiler-based solution such as Read-Only RAR. The performance of our mechanism and its applicability on various platforms make it an effective and viable solution for end users.
Author Chen, Chun-Chung
Hung, Shih-Hao
Lee, Chen-Pang
Author_xml – sequence: 1
  givenname: Chun-Chung
  surname: Chen
  fullname: Chen, Chun-Chung
  email: r96944030@ntu.edu.tw
– sequence: 2
  givenname: Shih-Hao
  surname: Hung
  fullname: Hung, Shih-Hao
– sequence: 3
  givenname: Chen-Pang
  surname: Lee
  fullname: Lee, Chen-Pang
BookMark eNpVkEFOwzAQRY0ACSi5AQtfwDDOJLG7bAuFSpXKoqytietUocFBtinq7UkEG2Yzmif9kf67YRe-946xOwn3EkA9TJUWKAALLQBQCjCyOmPZgHGEI4PzfzfgFctifIdhClVVCNds9Rr65Gxqe89pT62Pic-_msYFvjm60HT9N5-lRPYQ-bEl_njy9NFaPm89hRPfBvKxozF-yy4b6qLL_vaEvS2ftosXsd48rxaztYgy10kg2WleWuVQW10SqDrHnCToQtdNIclNm3ynSudcUdTVrkJn0SqFsgQJlbU4Yfnv3_gZWr93wdR9f4hGDgIGL2YobNCMlc3owIxe8AeW8FbO
ContentType Book Chapter
Copyright Springer Basel AG 2011
Copyright_xml – notice: Springer Basel AG 2011
DOI 10.1007/978-3-0348-0031-0_16
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
Computer Science
EISBN 9783034800310
3034800312
Editor Shin, Sung Y.
Gantenbein, Rex
Kuo, Tei-Wei
Hong, Jiman
Editor_xml – sequence: 1
  givenname: Sung Y.
  surname: Shin
  fullname: Shin, Sung Y.
  email: sung.shin@sdstate.edu
– sequence: 2
  givenname: Rex
  surname: Gantenbein
  fullname: Gantenbein, Rex
  email: rex@uwyo.edu
– sequence: 3
  givenname: Tei-Wei
  surname: Kuo
  fullname: Kuo, Tei-Wei
  email: ktw@csie.ntu.edu.tw
– sequence: 4
  givenname: Jiman
  surname: Hong
  fullname: Hong, Jiman
  email: Jiman@ssu.ac.kr
EndPage 324
GroupedDBID -T.
089
0D6
0DA
0E8
38.
4UP
4V3
92K
A4J
AABBV
AAJYQ
AATVQ
ABBUY
ABCYT
ABMKK
ABMNI
ACBPT
ACDTA
ACDUY
ACZTO
ADVHH
AEHEY
AEJLV
AEKFX
AEOKE
AETDV
AEZAY
AHNNE
AHSMR
ALMA_UNASSIGNED_HOLDINGS
ANXAN
ATJMZ
AZZ
BBABE
CZZ
I4C
IEZ
MYL
SBO
TPJZQ
Z7R
Z7U
Z7X
Z7Z
Z81
Z83
Z84
Z85
Z88
ID FETCH-LOGICAL-s128t-3ac925c7e38c85a07b232a10848bf41ae9f2d75eee44b6d63ec3c773150106cc3
ISBN 9783034800303
3034800304
IngestDate Tue Jul 29 20:25:22 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s128t-3ac925c7e38c85a07b232a10848bf41ae9f2d75eee44b6d63ec3c773150106cc3
PageCount 20
ParticipantIDs springer_books_10_1007_978_3_0348_0031_0_16
PublicationCentury 2000
PublicationDate 2010
PublicationDateYYYYMMDD 2010-01-01
PublicationDate_xml – year: 2010
  text: 2010
PublicationDecade 2010
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationSeriesTitle Autonomic Systems
PublicationSeriesTitleAlternate Autonomic Systems (Birkhäuser)
PublicationSubtitle International Conference, RACS 2010, Atlanta, GA, USA, October 27-30, 2010
PublicationTitle Reliable and Autonomous Computational Science
PublicationYear 2010
Publisher Springer Basel
Publisher_xml – name: Springer Basel
SSID ssj0000476630
Score 1.3735884
Snippet Buffer overflow attacks are serious security threats to modern computer systems. Prior works against buffer overflow attacks may require users to patch the...
SourceID springer
SourceType Publisher
StartPage 305
SubjectTerms Benchmark Program
Malicious Code
Performance Degradation
Return Address
Virtual Machine
Title Protection against Buffer Overflow Attacks via Dynamic Binary Translation
URI http://link.springer.com/10.1007/978-3-0348-0031-0_16
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07b9swECYad2k7pE1a9JEGHLoJDGTzIWnIYOcBN2iaDEmQTTjRdGLAkIFabtH8-t5JpKU8lnQhBIGm5PtE3vF43x1j31IF4FDtCFS1ViicQKIwMBEyk5kBrQsNRE4-_WnGl-rkWl-HEveeXVIVe_buSV7J_6CK9xBXYsk-A9n1oHgDrxFfbBFhbB8Yv_fdrD5F7HxW857I9T1cVcROoHjWpk5D8PH5udue4jt_yr4qBTU3La7ecXw7uxVjWDyI1KEfinMI_ZtXOG-SPNQRzTcwQ0szGq2o4Ep0hrKczhd_omFVEYs_-j2D6PBvCRSKP2o4wLWanLdfBonMLff9X8F-3Wzq3jFRx7d1HRPBMRmNUB3P721bUW2qlJYX2Vk6Zaw7Wlg2zOpHC3w3poNGEbQqCdzImA22kaSqx14Oj05-XK39bLFK0KiKidYTntrkg-y8RYdS-dTIjw7Ja9vj4i17Q3wUTkQRnAPv2AtXbrHNUI2De4C32OvTdQbe5Tb73mLDPTa8wYYHbLjHhiM23GPDG2x4B5v37PL46OJgLHzZDLFEY6MSEmw20DZxMrWphjgp0GqGPhVOKKaqDy6bDiaJds4pVZiJkc5KmyQStwb92FgrP7BeuSjdR8bBoF4mI3yQAe38M9BFbGCqpKPCjvYTi4JkcpoIyzxkwUY55jInOdbZZ3OS4-dn9f7CXrVf1Q7rVb9W7isagFWx6zH-B0cIVsM
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Reliable+and+Autonomous+Computational+Science&rft.au=Chen%2C+Chun-Chung&rft.au=Hung%2C+Shih-Hao&rft.au=Lee%2C+Chen-Pang&rft.atitle=Protection+against+Buffer+Overflow+Attacks+via+Dynamic+Binary+Translation&rft.series=Autonomic+Systems&rft.date=2010-01-01&rft.pub=Springer+Basel&rft.isbn=9783034800303&rft.spage=305&rft.epage=324&rft_id=info:doi/10.1007%2F978-3-0348-0031-0_16
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783034800303/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783034800303/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783034800303/sc.gif&client=summon&freeimage=true