lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <3F3ACD7E.8080201@immunix.com>
Date: Wed, 13 Aug 2003 16:45:02 -0700
From: Crispin Cowan <crispin@...unix.com>
To: "BUGTRAQ@...URITYFOCUS.COM" <BUGTRAQ@...URITYFOCUS.COM>,
	secpapers@...urityfocus.com
Subject: PointGuard: It's not the Size of the Buffer, it's the Address of
 the Pointer


This seems topical to today's discussion of buffer overflow defenses:

    "PointGuard: Protecting Pointers From Buffer Overflow
    Vulnerabilities". Crispin Cowan, Steve Beattie, John Johansen and
    Perry Wagle. To appear at the 12^th USENIX Security Symposium
    <http://www.usenix.org/events/sec03/>, Washington DC, August 4-8,
    2003. Paper
    <http://immunix.com/%7Ecrispin/pointguard_usenix_security2003.pdf>
    and Talk
    <http://immunix.com/%7Ecrispin/pointguard_usenix_security2003.ppt>.

    PointGuard^TM : Protecting Pointers From Buffer Overflow Vulnerabilities
    Crispin Cowan, Steve Beattie, John Johansen and Perry Wagle
    Immunix, Inc.

    Despite numerous security technologies crafted to resist buffer
    overflow vulnerabilities, buffer overflows continue to be the
    dominant form of software security vulnerability. This is because
    most buffer overflow defenses provide only partial coverage, and the
    attacks have adapted to exploit problems that are not well-defended,
    such as heap overflows. This paper presents PointGuard, a compiler
    technique to defend against most kinds of buffer overflows by
    encrypting pointers when stored in memory, and decrypting them only
    when loaded into CPU registers. We describe the PointGuard
    implementation, show that PointGuard s overhead is low when
    protecting real security-sensitive applications such as OpenSSL, and
    show that PointGuard is effective in defending against buffer
    overflow vulnerabilities that are not blocked by previous defenses.

Thanks to Snax and the Shmoo for a better tag line: It's not the Size of 
the Buffer, it's the Address of the Pointer

Crispin

-- 
Crispin Cowan, Ph.D.           http://immunix.com/~crispin/
Chief Scientist, Immunix       http://immunix.com
            http://www.immunix.com/shop/




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ