Application of Hardware Encryption while Operating with STACK for Exploit Safeguard
This paper deals with stack data unauthorized modification protection methods by means of data encryption while fulfilling direct or indirect commands PUSH and POP. These methods are aimed at counteraction of exploits, which substitute return address and parameters of functions called.
Main Author: | D. V. Gurov |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2011-09-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/615 |
Similar Items
-
Fine-Grained Modeling of ROP Vulnerability Exploitation Process under Stack Overflow Based on Petri Nets
by: Liumei Zhang, et al.
Published: (2023-11-01) -
Requirements for symmetric block encryption algorithms developed for software and hardware implementation
by: Kairat Sakanuly Sakan, et al.
Published: (2021-12-01) -
Stack operation of tensor networks
by: Zhang, Tianning, et al.
Published: (2022) -
Landslide hazard assessment based on improved Stacking model
by: Rongchang Guo, et al.
Published: (2024-02-01) -
Classification of PolSAR Images by Stacked Random Forests
by: Ronny Hänsch, et al.
Published: (2018-02-01)