Eliminating the threat of kernel stack overflows

Yair Wiseman, Joel Isaacson, Eliad Lubovsky

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The Linux kernel stack has a fixed size. There is no mechanism to prevent the kernel from overflowing the stack. Hackers can exploit this bug to put unwanted information in the memory of the operating system and gain control over the system. In order to prevent this problem, we introduce a dynamically sized kernel stack that can be integrated into the standard Linux kernel. The well-known paging mechanism is reused with some changes, in order to enable the kernel stack to grow.

Original languageEnglish
Title of host publication2008 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2008
Pages116-121
Number of pages6
DOIs
StatePublished - 2008
Event2008 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2008 - Las Vegas, NV, United States
Duration: 13 Jul 200815 Jul 2008

Publication series

Name2008 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2008

Conference

Conference2008 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2008
Country/TerritoryUnited States
CityLas Vegas, NV
Period13/07/0815/07/08

Fingerprint

Dive into the research topics of 'Eliminating the threat of kernel stack overflows'. Together they form a unique fingerprint.

Cite this