Buffer Overflow Protection
Buffer Overflow Protection
Assumption 1:
In an attack, a buffer is always overflowed using a buffer
passed from another domain.
This concept is not new. For example, Howard and LeBlanc v:oid ftiiic(ifhar ' p, ilmt, i)
state in their book "All input is evil until proven otherwise" I '~~~~~~~~1 CDiiitjy=IOiimy
i* local wariabule*
[9]. Accordingly, an intuitive way to prevent buffer-overflow
attacks is to detect and validate input, especially input which is . ___ ________ ___ _ ___ ___
UlYllYlydL
b11211X
char b1)2b1,p
eventually used for control. r,h,py bIp;
VI. SUMMARY
Buffer-overflow attacks on control data require overflowing