Hardware-enforced protection against buffer overflow using masked program counter
From MaRDI portal
Publication:2803655
DOI10.1007/978-3-662-49301-4_27zbMATH Open1405.94057OpenAlexW2469131469MaRDI QIDQ2803655FDOQ2803655
Authors: Jean-Luc Danger, Sylvain Guilley, Thibault Porteboeuf, Florian Praden, Michaël Timbert
Publication date: 2 May 2016
Published in: The New Codebreakers (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49301-4_27
Recommendations
- Hardware/software optimization for array {\&} pointer boundary checking against buffer overflow attacks
- scientific article; zbMATH DE number 1980946
- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks
- Prevent kernel return-oriented programming attacks using hardware virtualization
- Information Security
Cited In (6)
- Processor anchor to increase the robustness against fault injection and cyber attacks
- Title not available (Why is that?)
- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks
- Hardware/software optimization for array {\&} pointer boundary checking against buffer overflow attacks
- Title not available (Why is that?)
- Prevent kernel return-oriented programming attacks using hardware virtualization
This page was built for publication: Hardware-enforced protection against buffer overflow using masked program counter
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2803655)