Application of Hardware Encryption while Operating with STACK for Exploit Safeguard
This paper deals with stack data unauthorized modification protection methods by means of data encryption while fulfilling direct or indirect commands PUSH and POP. These methods are aimed at counteraction of exploits, which substitute return address and parameters of functions called.
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2011-09-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/615 |
_version_ | 1797720503672111104 |
---|---|
author | D. V. Gurov |
author_facet | D. V. Gurov |
author_sort | D. V. Gurov |
collection | DOAJ |
description | This paper deals with stack data unauthorized modification protection methods by means of data encryption while fulfilling direct or indirect commands PUSH and POP. These methods are aimed at counteraction of exploits, which substitute return address and parameters of functions called. |
first_indexed | 2024-03-12T09:20:24Z |
format | Article |
id | doaj.art-aa6c5634679d498ebef1c920043d662e |
institution | Directory Open Access Journal |
issn | 2074-7128 2074-7136 |
language | English |
last_indexed | 2024-03-12T09:20:24Z |
publishDate | 2011-09-01 |
publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
record_format | Article |
series | Безопасность информационных технологий |
spelling | doaj.art-aa6c5634679d498ebef1c920043d662e2023-09-02T14:33:17ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362011-09-011833741605Application of Hardware Encryption while Operating with STACK for Exploit SafeguardD. V. GurovThis paper deals with stack data unauthorized modification protection methods by means of data encryption while fulfilling direct or indirect commands PUSH and POP. These methods are aimed at counteraction of exploits, which substitute return address and parameters of functions called.https://bit.mephi.ru/index.php/bit/article/view/615software vulnerabilitiesstackR-blocksrandomization |
spellingShingle | D. V. Gurov Application of Hardware Encryption while Operating with STACK for Exploit Safeguard Безопасность информационных технологий software vulnerabilities stack R-blocks randomization |
title | Application of Hardware Encryption while Operating with STACK for Exploit Safeguard |
title_full | Application of Hardware Encryption while Operating with STACK for Exploit Safeguard |
title_fullStr | Application of Hardware Encryption while Operating with STACK for Exploit Safeguard |
title_full_unstemmed | Application of Hardware Encryption while Operating with STACK for Exploit Safeguard |
title_short | Application of Hardware Encryption while Operating with STACK for Exploit Safeguard |
title_sort | application of hardware encryption while operating with stack for exploit safeguard |
topic | software vulnerabilities stack R-blocks randomization |
url | https://bit.mephi.ru/index.php/bit/article/view/615 |
work_keys_str_mv | AT dvgurov applicationofhardwareencryptionwhileoperatingwithstackforexploitsafeguard |