Publication: Stack Protection Mechanisms In Packet Processing Systems
dc.contributor.advisor | Tilman Wolf | |
dc.contributor.author | Wu, Peng | |
dc.contributor.department | University of Massachusetts Amherst | |
dc.contributor.department | Electrical & Computer Engineering | |
dc.date | 2023-09-23T07:45:49.000 | |
dc.date.accessioned | 2024-04-26T21:20:25Z | |
dc.date.available | 2013-08-06T00:00:00Z | |
dc.date.issued | 2013-01-01 | |
dc.date.submitted | February | |
dc.description.abstract | As the functionality that current computer network can provide is becoming complicated, a traditional router with application-specific integrated circuit (ASIC) implementation can't satisfy the flexibility requirements. Instead, a programmable packet forward system based on a general-purpose processor could provide the flexibility. While this system provides flexibility, a new potential security issue arises. Usually, software is involved as the packet forward system is programmable. The software's potential vulnerability, especially as to the remote exploits, becomes an issue of network security. In this thesis work, we proposed a software stack overflow vulnerability on click modular router and show how a disastrous denial-of-service attack on click modular router could be triggered by a single packet. In our research work, click modular router runs on Linux operating system based on general-purpose hardware. We actually showed that even a software router run within a modern operating system's protection is vulnerable by elaborate attack. And we checked the possible stack protection mechanisms on modern OS based on general-purpose hardware and proposed a possible stack protection mechanism for embedded OS. | |
dc.description.degree | Master of Science in Electrical and Computer Engineering (M.S.E.C.E.) | |
dc.identifier.doi | https://doi.org/10.7275/3666729 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14394/47914 | |
dc.relation.url | https://scholarworks.umass.edu/cgi/viewcontent.cgi?article=2139&context=theses&unstamped=1 | |
dc.source.status | published | |
dc.subject | Stack Protection | |
dc.subject | Buffer Overflow | |
dc.subject | Packet Processing Systems | |
dc.subject | Digital Communications and Networking | |
dc.title | Stack Protection Mechanisms In Packet Processing Systems | |
dc.type | campus | |
dc.type | article | |
dc.type | thesis | |
digcom.contributor.author | isAuthorOfPublication|email:wupeng20022010@gmail.com|institution:University of Massachusetts Amherst|Wu, Peng | |
digcom.date.embargo | 2013-08-06T00:00:00-07:00 | |
digcom.identifier | theses/972 | |
digcom.identifier.contextkey | 3666729 | |
digcom.identifier.submissionpath | theses/972 | |
dspace.entity.type | Publication |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- PENG_WU_Thesis_revised2.pdf
- Size:
- 1.31 MB
- Format:
- Adobe Portable Document Format