stack canaries
Stack canaries, also known as stack cookies or security cookies, are random values placed on the stack of a program to detect buffer overflow attacks. These canaries act as a guard or early warning system, as they are checked before the program returns from a function. If the canary value has been altered or overwritten, it indicates that a buffer overflow attack has occurred, enabling the program to detect and prevent such attacks from succeeding.
Requires login.
Related Concepts (20)
- buffer overflow attacks
- buffer overflows
- canary values
- code injection defense
- control-flow hijacking mitigations
- data integrity protection
- exploit mitigation
- heap-based buffer overflow
- memory corruption
- memory corruption mitigation techniques
- non-executable stack protection
- program crash prevention
- program vulnerability
- return address overwrite strategies
- reverse engineering techniques for buffer overflows
- software security
- stack smashing
- stack smashing protection (ssp)
- stack smashing protection bypass
- techniques to mitigate buffer overflow attacks