Stack Buffer Overflow - Protection Schemes

Protection Schemes

Over the years a number of schemes have been developed to inhibit malicious stack buffer overflow exploitation. These may usually be classified into three categories:

  • Detect that a stack buffer overflow has occurred and thus prevent redirection of the instruction pointer to malicious code.
  • Prevent the execution of malicious code from the stack without directly detecting the stack buffer overflow.
  • Randomize the memory space such that finding executable code becomes unreliable.

Read more about this topic:  Stack Buffer Overflow

Famous quotes containing the words protection and/or schemes:

    The protection of a ten-year-old girl from her father’s advances is a necessary condition of social order, but the protection of the father from temptation is a necessary condition of his continued social adjustment. The protections that are built up in the child against desire for the parent become the essential counterpart to the attitudes in the parent that protect the child.
    Margaret Mead (1901–1978)

    Science is a dynamic undertaking directed to lowering the degree of the empiricism involved in solving problems; or, if you prefer, science is a process of fabricating a web of interconnected concepts and conceptual schemes arising from experiments and observations and fruitful of further experiments and observations.
    James Conant (1893–1978)