Preventing stack overflow using Alternative Stack approaches

Khairol Amin Mohd Salleh, Abd Rahim Ahmad, Roslan Ismail

Research output: Contribution to journalArticle

Abstract

Buffer overflow marks a phenomenon of a malicious technique employed by attackers, as reported in the NIST statistics. This paper presents a method of implementing a dual stack approach using software to protect the data stack from experiencing the attack by using 3 types of architecture, ranging from parallel program, multi-threading to a simple sequential subroutine. The current research on dual stack may require new hardware or a modified version of compiler which may complicate the implementation. These implementations spark some major issues in code backward compatibility with some changes in the language semantics especially in handling the movement of data to and from the dual stack. This paper discusses the implementation of Alternative Stack prototypes in 3 types of architecture and observation on its behavior during the performance and security test. The test has been benchmarked against the programs that are compiled with Microsoft Security Cookie. The Alternative Stack Architecture 3 prototype displayed a significant performance against the benchmarked programs whilst maintaining the confidentiality, integrity and availability of the programs.

Original languageEnglish
Pages (from-to)239-243
Number of pages5
JournalInternational Journal of Engineering and Technology(UAE)
Volume7
Issue number4
DOIs
Publication statusPublished - 01 Jan 2018

Fingerprint

Confidentiality
Subroutines
Electric sparks
Semantics
Buffers
Language
Software
Statistics
Availability
Hardware
Research

All Science Journal Classification (ASJC) codes

  • Biotechnology
  • Computer Science (miscellaneous)
  • Environmental Engineering
  • Chemical Engineering(all)
  • Engineering(all)
  • Hardware and Architecture

Cite this

@article{42131a5052c0445984bd0cb11e1459d1,
title = "Preventing stack overflow using Alternative Stack approaches",
abstract = "Buffer overflow marks a phenomenon of a malicious technique employed by attackers, as reported in the NIST statistics. This paper presents a method of implementing a dual stack approach using software to protect the data stack from experiencing the attack by using 3 types of architecture, ranging from parallel program, multi-threading to a simple sequential subroutine. The current research on dual stack may require new hardware or a modified version of compiler which may complicate the implementation. These implementations spark some major issues in code backward compatibility with some changes in the language semantics especially in handling the movement of data to and from the dual stack. This paper discusses the implementation of Alternative Stack prototypes in 3 types of architecture and observation on its behavior during the performance and security test. The test has been benchmarked against the programs that are compiled with Microsoft Security Cookie. The Alternative Stack Architecture 3 prototype displayed a significant performance against the benchmarked programs whilst maintaining the confidentiality, integrity and availability of the programs.",
author = "{Mohd Salleh}, {Khairol Amin} and Ahmad, {Abd Rahim} and Roslan Ismail",
year = "2018",
month = "1",
day = "1",
doi = "10.14419/ijet.v7i4.35.22739",
language = "English",
volume = "7",
pages = "239--243",
journal = "International Journal of Engineering and Technology(UAE)",
issn = "2227-524X",
publisher = "Science Publishing Corporation Inc",
number = "4",

}

Preventing stack overflow using Alternative Stack approaches. / Mohd Salleh, Khairol Amin; Ahmad, Abd Rahim; Ismail, Roslan.

In: International Journal of Engineering and Technology(UAE), Vol. 7, No. 4, 01.01.2018, p. 239-243.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Preventing stack overflow using Alternative Stack approaches

AU - Mohd Salleh, Khairol Amin

AU - Ahmad, Abd Rahim

AU - Ismail, Roslan

PY - 2018/1/1

Y1 - 2018/1/1

N2 - Buffer overflow marks a phenomenon of a malicious technique employed by attackers, as reported in the NIST statistics. This paper presents a method of implementing a dual stack approach using software to protect the data stack from experiencing the attack by using 3 types of architecture, ranging from parallel program, multi-threading to a simple sequential subroutine. The current research on dual stack may require new hardware or a modified version of compiler which may complicate the implementation. These implementations spark some major issues in code backward compatibility with some changes in the language semantics especially in handling the movement of data to and from the dual stack. This paper discusses the implementation of Alternative Stack prototypes in 3 types of architecture and observation on its behavior during the performance and security test. The test has been benchmarked against the programs that are compiled with Microsoft Security Cookie. The Alternative Stack Architecture 3 prototype displayed a significant performance against the benchmarked programs whilst maintaining the confidentiality, integrity and availability of the programs.

AB - Buffer overflow marks a phenomenon of a malicious technique employed by attackers, as reported in the NIST statistics. This paper presents a method of implementing a dual stack approach using software to protect the data stack from experiencing the attack by using 3 types of architecture, ranging from parallel program, multi-threading to a simple sequential subroutine. The current research on dual stack may require new hardware or a modified version of compiler which may complicate the implementation. These implementations spark some major issues in code backward compatibility with some changes in the language semantics especially in handling the movement of data to and from the dual stack. This paper discusses the implementation of Alternative Stack prototypes in 3 types of architecture and observation on its behavior during the performance and security test. The test has been benchmarked against the programs that are compiled with Microsoft Security Cookie. The Alternative Stack Architecture 3 prototype displayed a significant performance against the benchmarked programs whilst maintaining the confidentiality, integrity and availability of the programs.

UR - http://www.scopus.com/inward/record.url?scp=85059240948&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85059240948&partnerID=8YFLogxK

U2 - 10.14419/ijet.v7i4.35.22739

DO - 10.14419/ijet.v7i4.35.22739

M3 - Article

VL - 7

SP - 239

EP - 243

JO - International Journal of Engineering and Technology(UAE)

JF - International Journal of Engineering and Technology(UAE)

SN - 2227-524X

IS - 4

ER -