Application of Hardware Encryption while Operating with STACK for Exploit Safeguard
This paper deals with stack data unauthorized modification protection methods by means of data encryption while fulfilling direct or indirect commands PUSH and POP. These methods are aimed at counteraction of exploits, which substitute return address and parameters of functions called.
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2011-09-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/615 |