Check out the new USENIX Web site. next up previous
Next: Other Architectures Up: Limitations Previous: Granularity

Unaffected Exploits

StackGhost will not stop every exploit, nor will it guarantee security. Exploits that StackGhost will not stop include:

  1. A corrupted function pointer (atexit table, .dtors, etc.)
  2. Data corruption leading to further insecure conditions.
  3. ``Somehow'' overwriting a frame pointer with a frame pointer from far shallower in the calling sequence. It will short circuit backwards through a functions' callers and may skip vital security checks.