{"title":"Enhancing Security Check in Visual Studio C/C++ Compiler","authors":"Yongdong Wu","doi":"10.1109/WCSE.2009.44","DOIUrl":null,"url":null,"abstract":"Buffer overflow exploitation is a major threat to software security. To reduce the threat, Visual studio C/C++compiler enables to randomize the addresses of the compiled program in initialization time, and to embed security stack guards by the compiled program in run time. The present paper upgrades the compiler by increasing the compiled program's capabilities in the following aspects: (1) protects a frame pointer from callee's tampering with at no additional cost; (2) defeats the attack which tampers 1-2 bytes of a protected region at a very low cost; (3) checks the indirect function call against the prologue pattern so as to reduce the probability of software crash in case of being attacked. Our experiments demonstrate the improvement on Microsoft Visual Studio in generating secure and robust software.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"24 6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 WRI World Congress on Software Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCSE.2009.44","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Buffer overflow exploitation is a major threat to software security. To reduce the threat, Visual studio C/C++compiler enables to randomize the addresses of the compiled program in initialization time, and to embed security stack guards by the compiled program in run time. The present paper upgrades the compiler by increasing the compiled program's capabilities in the following aspects: (1) protects a frame pointer from callee's tampering with at no additional cost; (2) defeats the attack which tampers 1-2 bytes of a protected region at a very low cost; (3) checks the indirect function call against the prologue pattern so as to reduce the probability of software crash in case of being attacked. Our experiments demonstrate the improvement on Microsoft Visual Studio in generating secure and robust software.