Skip to main content
Other
STACK PROTECTION MECHANISMS IN PACKET PROCESSING SYSTEMS
(2012)
  • PENG WU, University of Massachusetts - Amherst
Abstract

As the functionality that current computer network can provide is becoming complicated, a traditional router with application-specific integrated circuit (ASIC) implementation can't satisfy the flexibility requirements. Instead, a programmable packet forward system based on a general-purpose processor could provide the flexibility. While this system provides flexibility, a new potential security issue arises. Usually, software is involved as the packet forward system is programmable. The software's potential vulnerability, especially as to the remote exploits, becomes an issue of network security. In this thesis work, we proposed a software stack overflow vulnerability on click modular router and show how a disastrous denial-of-service attack on click modular router could be triggered by a single packet. In our research work, click modular router runs on Linux operating system based on general-purpose hardware. We actually showed that even a software router run within a modern operating system's protection is vulnerable by elaborate attack. And we checked the possible stack protection mechanisms on modern OS based on general-purpose hardware and proposed a possible stack protection mechanism for embedded OS.

Keywords
  • network security,
  • stack buffer overflow attack,
  • software router
Publication Date
2012
Citation Information
PENG WU. "STACK PROTECTION MECHANISMS IN PACKET PROCESSING SYSTEMS" (2012)
Available at: http://works.bepress.com/peng_wu/1/