SSPFA: effective stack smashing protection for Android OS
نویسندگان
چکیده
منابع مشابه
Smashing the stack - A 25 year retrospective
Buffer overflows still remain a problem for software today. Even with address space randomization and non-executable stacks software remains vulnerable to clever exploits. In this paper we introduce the buffer overflow through a pratical example and take a retrospective look on the past 25 years of the arms race on buffer overflow exploits and protections.
متن کاملParallelization Algorithm for Android OS using OpenMP
Developments in mobile technology have escalated with unprecedented speeds in the last years in all areas of implementation. One of these areas is multicore computing and parallel programming. Though most modern mobile devices are at least multithreaded and commonly multicore, few applications can benefit such technology. In this paper we show the benefits of multithreaded programming using Ope...
متن کاملTransparent Run-Time Defense Against Stack-Smashing Attacks
Stack Smashing Attacks Arash Baratloo and Navjot Singh farash,[email protected] Bell Labs Research, Lucent Technologies 600 Mountain Ave Murray Hill, NJ 07974 USA Timothy Tsai [email protected] Reliable Software Technologies 21351 Ridgetop Circle, Suite 400 Dulles, VA 20166 USA Abstract The exploitation of bu er over ow vulnerabilities in process stacks constitutes a signi cant port...
متن کاملUsing Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks
The ICAT statistics over the past few years have shown at least one out of every five CVE and CVE candidate vulnerabilities have been due to buffer overflows. This constitutes a significant portion of today’s computer related security concerns. In this paper we introduce a novel method for detecting stack smashing and buffer overflow attacks. Our runtime method extracts return addresses from th...
متن کاملA Bengali Speech Synthesizer on Android OS
Different Bengali TTS systems are already available on a resourceful platform such as a personal computer. However, porting these systems to a resource limited device such as a mobile phone is not an easy task. Practical aspects including application size and processing time have to be concerned. This paper describes the implementation of a Bengali speech synthesizer on a mobile device. For spe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information Security
سال: 2019
ISSN: 1615-5262,1615-5270
DOI: 10.1007/s10207-018-00425-8