Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2017, Vol. 40 ›› Issue (s1): 122-125,129.doi: 10.13190/j.jbupt.2017.s.027

• Papers • Previous Articles     Next Articles

Analysis of SSP Security Based on Canary Reuse

LIU Song, QIN Xiao-jun, GAN Shui-tao, JIANG Hai-bo   

  1. Jiangnan Institute of Computing Technology, Jiangsu Wuxi 214083, China
  • Received:2016-05-30 Online:2017-09-28 Published:2017-09-28

Abstract: Stack smashing protector(SSP) is the most effective security mechanism to mitigate the stack buffer overflow vulnerability, which guarantees stack unmodified by generating random numbers. At present, the main technology to bypass SSP mechanism is based on brute force attack. This paper reveals a security defect model which can reveal the random number. Because the operating system does not empty the dead stack frame in time, the random number exists in the invalid space, and the bypass to leverage this characteristic is called reuse of canary attack. The experiment proves the usability and stability of this security model. Based on this feature, two effective solutions are proposed.

Key words: stack smashing protector, Canary reuse, Linux random number, stack buffer overflow

CLC Number: