Next: Where to Insert RAD
Up: Binary-Rewriting Return Address Defense
Previous: Disassembly Engine Implementation
Because it is not always possible to derive the high-level control flow of an input binary, the process of inserting additional code to counter buffer overflow attacks must proceed in a way that does not disturb the memory references used in the instructions of the binary program that is to be protected.
Subsections
Manish Prasad
2003-04-05