Application of Hardware Encryption while Operating with STACK for Exploit Safeguard

This paper deals with stack data unauthorized modification protection methods by means of data encryption while fulfilling direct or indirect commands PUSH and POP. These methods are aimed at counteraction of exploits, which substitute return address and parameters of functions called.

Bibliographic Details
Main Author: D. V. Gurov
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2011-09-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/615