Protegendo Programas Contra Violação de Memória em Hardware (Protecting Programs Against Memory Violation In Hardware)

Antonio Lemos Maia Neto (lemosmaia@dcc.ufmg.br)1, Leandro Terra Cunha Melo (ltcmelo@gmail.com)1, Omar Paranaiba Vilela Neto (omar@dcc.ufmg.br)2, Fernando Magno Quintão Pereira (fernando@dcc.ufmg.br)1, Leonardo Barbosa Oliveira (leob@dcc.ufmg.br)1


1Universidade Federal de Minas Gerais
2 Neto

This paper appears in: Revista IEEE América Latina

Publication Date: March 2015
Volume: 13,   Issue: 3 
ISSN: 1548-0992


Abstract:
The C and C++ programming languages do not prevent ouf-of-bounds memory access, consequently leaving room to attacks such as buffer overflow and buffer overread. There are several techniques to make C programs safe. However these methods are usually implemented via software and tend to cause performance degradation. Our work aims at a hardware solution which is able to check bounds efficiently, by providing novel instructions that are aware of a buffer's valid memory range. Whenever a violation is found the program will terminate, a typical hardware exception behavior.

Index Terms:
Code Security,Memory Violation,Buffer Overflow,Buffer Overread   


Documents that cite this document
This function is not implemented yet.


[PDF Full-Text (605)]