On Tue, 14 Sep 1999, Crispin Cowan wrote:

> (post sent as HTML and ASCII because there's a table that's easier to read
> in HTML.  Aleph, go ahead and nuke the HTML if you prefer)

Urg. Pine happily munged it on reply:

> The result looks like this:
>
>             Interface                            Implementation
>
>  Restriction   * Firewalls                          * Bounds checking
>                * TCP Wrappers                       * StackGuard
>                * Randomly renaming system files
>                * Randomly renumbering system
>  Permutation     calls (the hack proposed here      * Randomly munging
>                  by Maniscalco)                       data layout
>                * Fred Cohen's Deception Toolkit

You missed a couple interesting ones. One is randomly offsetting the
stack. Another is having separate stacks for the call chain and local
variables. Obviously wastes a register (or an indirection), but can
probably be proved secure against stack smashing.

--
 "Love the dolphins," she advised him. "Write by W.A.S.T.E.."

Reply via email to