Check out the new USENIX Web site. next up previous
Next: Where to Insert RAD Up: Binary-Rewriting Return Address Defense Previous: Disassembly Engine Implementation

Binary Instrumentation

Because it is not always possible to derive the high-level control flow of an input binary, the process of inserting additional code to counter buffer overflow attacks must proceed in a way that does not disturb the memory references used in the instructions of the binary program that is to be protected.

Subsections

Manish Prasad
2003-04-05