Application of Hardware Encryption while Operating with STACK for Exploit Safeguard

This paper deals with stack data unauthorized modification protection methods by means of data encryption while fulfilling direct or indirect commands PUSH and POP. These methods are aimed at counteraction of exploits, which substitute return address and parameters of functions called.

Bibliographic Details
Main Author: D. V. Gurov
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2011-09-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/615
_version_ 1797720503672111104
author D. V. Gurov
author_facet D. V. Gurov
author_sort D. V. Gurov
collection DOAJ
description This paper deals with stack data unauthorized modification protection methods by means of data encryption while fulfilling direct or indirect commands PUSH and POP. These methods are aimed at counteraction of exploits, which substitute return address and parameters of functions called.
first_indexed 2024-03-12T09:20:24Z
format Article
id doaj.art-aa6c5634679d498ebef1c920043d662e
institution Directory Open Access Journal
issn 2074-7128
2074-7136
language English
last_indexed 2024-03-12T09:20:24Z
publishDate 2011-09-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj.art-aa6c5634679d498ebef1c920043d662e2023-09-02T14:33:17ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362011-09-011833741605Application of Hardware Encryption while Operating with STACK for Exploit SafeguardD. V. GurovThis paper deals with stack data unauthorized modification protection methods by means of data encryption while fulfilling direct or indirect commands PUSH and POP. These methods are aimed at counteraction of exploits, which substitute return address and parameters of functions called.https://bit.mephi.ru/index.php/bit/article/view/615software vulnerabilitiesstackR-blocksrandomization
spellingShingle D. V. Gurov
Application of Hardware Encryption while Operating with STACK for Exploit Safeguard
Безопасность информационных технологий
software vulnerabilities
stack
R-blocks
randomization
title Application of Hardware Encryption while Operating with STACK for Exploit Safeguard
title_full Application of Hardware Encryption while Operating with STACK for Exploit Safeguard
title_fullStr Application of Hardware Encryption while Operating with STACK for Exploit Safeguard
title_full_unstemmed Application of Hardware Encryption while Operating with STACK for Exploit Safeguard
title_short Application of Hardware Encryption while Operating with STACK for Exploit Safeguard
title_sort application of hardware encryption while operating with stack for exploit safeguard
topic software vulnerabilities
stack
R-blocks
randomization
url https://bit.mephi.ru/index.php/bit/article/view/615
work_keys_str_mv AT dvgurov applicationofhardwareencryptionwhileoperatingwithstackforexploitsafeguard