Next: Binary Disassembly
Up: A Binary Rewriting Defense against Stack-based Buffer Overflow Attacks
Previous: Related Work
A successful binary rewriting RAD system requires identifying the boundary of every procedure in the input program and inserting a protection instruction sequence into every procedure without disturbing the input binary's internal referencing structure. The following two subsections discuss in more detail these two issues and their associated solutions.
Subsections
Manish Prasad
2003-04-05