Buffer overflow vulnerabilities have been known for a long time, are widespread and relevant today. To protect against buffer overflows, developers of operating systems usually use standard mechanisms of operating systems, but they are not very effective in attacks using return-oriented programming techniques. The article proposes a model for checking the legitimacy of program control flow transitions when executing a return instruction, based on an access graph. The article also provides a model for checking the legitimacy of program control flow transitions when executing a return instruction, based on the use of a shadow stack, a model for generating a program control flow. Modeling was carried out in the specification language based on set theory, first-order logic and temporal logic of actions, models were checked using the Model Checking method. The constructed models can be refined to the required level of abstraction, used to create mechanisms for protecting operating systems based on Linux from attacks using the return-oriented programming technique.
Original languageEnglish
Title of host publicationProceedings - 2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology, USBEREIT 2023
Subtitle of host publicationbook
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages320-323
Number of pages4
ISBN (Electronic)979-835033605-4
DOIs
Publication statusPublished - 15 May 2023
Event2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT) - ИРИТ-РТФ УрФУ, Екатеринбург, Russian Federation
Duration: 15 May 202317 May 2023

Conference

Conference2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT)
Country/TerritoryRussian Federation
CityЕкатеринбург
Period15/05/202317/05/2023

ID: 41985005