Protegendo Programas Contra Violação de Memória em Hardware
(Protecting Programs Against Memory Violation In Hardware)
Antonio Lemos Maia Neto (email@example.com)1, Leandro Terra Cunha Melo (firstname.lastname@example.org)1, Omar Paranaiba Vilela Neto (email@example.com)2, Fernando Magno Quintão Pereira (firstname.lastname@example.org)1, Leonardo Barbosa Oliveira (email@example.com)1
1Universidade Federal de Minas Gerais2 Neto
This paper appears in: Revista IEEE América Latina
Publication Date: March 2015
Volume: 13, Issue: 3
The C and C++ programming languages do not prevent ouf-of-bounds memory access, consequently leaving room to attacks such as buffer overflow and buffer overread. There are several techniques to make C programs safe. However these methods are usually implemented via software and tend to cause performance degradation. Our work aims at a hardware solution which is able to check bounds efficiently, by providing novel instructions that are aware of a buffer's valid memory range. Whenever a violation is found the program will terminate, a typical hardware exception behavior.
Code Security,Memory Violation,Buffer Overflow,Buffer Overread
Documents that cite this
This function is not implemented yet.
[PDF Full-Text (605)]