Check out the new USENIX Web site. next up previous
Next: Binary Disassembly Up: A Binary Rewriting Defense against Stack-based Buffer Overflow Attacks Previous: Related Work

Binary-Rewriting Return Address Defense

A successful binary rewriting RAD system requires identifying the boundary of every procedure in the input program and inserting a protection instruction sequence into every procedure without disturbing the input binary's internal referencing structure. The following two subsections discuss in more detail these two issues and their associated solutions.

Subsections

Manish Prasad
2003-04-05