
Bugtraq mailing list archives
machine independent protection from stack-smashing attack
From: Hiroaki Etoh <ETOH () JP IBM COM>
Date: Wed, 9 Aug 2000 18:59:49 +0900
I have been investigating a machine-independent change to GCC that would generate code to protect applications from stack-smashing attacks. The main characteristics are low performance overhead of the protection code, protecting against different varieties of stack-smashing attacks, and supporting various processors. A research report is ready on the web (http://www.trl.ibm.co.jp/projects/security/propolice). I would like some feedback whether it is worth pursuing getting it assigned to the FSF for inclusion in GCC. --- Hiroaki Etoh, Tokyo Research Laboratory, IBM Japan
Current thread:
- machine independent protection from stack-smashing attack Hiroaki Etoh (Aug 09)
- Re: machine independent protection from stack-smashing attack John Viega (Aug 10)
- Re: machine independent protection from stack-smashing attack Yarrow Charnot (Aug 15)
- Re: machine independent protection from stack-smashing attack Ariel Waissbein (Aug 18)
- PRNGs (was Re: machine independent protection from stack-smashing attack) John Viega (Aug 18)
- Re: PRNGs (was Re: machine independent protection from stack-smashingattack) Crispin Cowan (Aug 18)
- Re: PRNGs (was Re: machine independent protection from stack-smashingattack) Andrea Glorioso (Aug 21)
- Re: PRNGs (was Re: machine independent protection from stack-smashingattack) John Viega (Aug 22)
- Re: machine independent protection from stack-smashing attack Yarrow Charnot (Aug 15)
- Re: machine independent protection from stack-smashing attack John Viega (Aug 10)
- Re: machine independent protection from stack-smashing attack Gerardo Richarte (Aug 18)
- <Possible follow-ups>
- Re: machine independent protection from stack-smashing attack Hiroaki Etoh (Aug 15)
- Re: machine independent protection from stack-smashing attack John Viega (Aug 15)