openPR Logo
Press release

atsec scientists find the ultimate buffer overflow protection

04-01-2008 12:39 PM CET | IT, New Media & Software

Press release from: atsec information security

Buffer overflow problems have plagued software programmers for at least three decades. While many partial solutions for buffer overflow have been introduced over the years, such approaches failed to leverage the considerable overflow protection experience amassed in other engineering areas. atsec scientists analyzed the proven “non-software overflow solutions” (NSOS) defined in United States Patents No. 5632302 and 4204285 … and have now successfully ported the principles of these technologies to finally solve one of the software world’s biggest headaches.

As a prerequisite to understanding how NSOS technology was applied to solving the software problem, it is important to grasp the commonalities of the Universal Overflow Premise (OEP):
a) The source that causes the overflow cannot be controlled.
b) More input will be provided on the input line than can be held by the buffer.

The proven NSOS framework for success calls for detecting the overflow condition and then diverting the overflow (just for fun, let’s call this “the additional bytes”) to flow into an appropriate container (let’s call this one, “a separate auxiliary buffer”). U.S. Patent 5632302 manages the diversion using a valve, while U.S. Patent 4204285 uses an outwardly extending spout with an exit level disposed below the upper surface.

Both NSOS technologies are interesting, but a software sensor triggering a software valve (the U.S. Patent 563202 technology) might be impractical to implement, so atsec has chosen a U.S. Patent 4204285-inspired solution. These are the basics:
a) All buffers that could potentially overflow shall have a spout located at the end of the buffer.
b) The buffer spout shall be connected to a separate auxiliary buffer.
c) In the case of a buffer overflow, the additional (overflow) bytes shall automatically flow into the auxiliary buffer.
d) To prevent the auxiliary buffer from overflowing, the auxiliary buffer shall be connected to a flushing mechanism, which shall automatically flush the additional bytes to an external entity. Note that for Unix-type operating systems, /dev/null may be used to flush the overflow bytes from the auxiliary buffer.

Important: The speed at which bytes can flow into the original buffer must not be greater than the speed at which bytes can flow into the auxiliary buffer and can be flushed out of the system. This can be achieved by adding a software valve in front of the input buffer that limits the byte input speed. If performance is an issue, the flow speed may be regulated depending on the fill level of the auxiliary buffer.

Note that using a shut-off valve (as suggested in U.S. Patent 4204285) might not always be acceptable in software systems.
U.S. Patent 5632302 also includes a function to notify users when an overflow condition has occurred. At this time, atsec does not recommend adopting the mechanism suggested in U.S. Patent 5632302 (blowing a horn); however, the idea is worthy of additional consideration.

atsec scientists are currently hard at work implementing an NSOS-inspired solution to solve the software buffer overflow problem, and we will soon begin accepting orders. Recognizing the very large number of software buffers that need overflow protection, atsec will offer a discount for software vendors ordering more than 100,000 buffer overflow protection devices.
The atsec China office has been tasked with locating a suitable manufacturing site.

Cited NSOS Technologies

United States Patent 4204285
An overflow protection apparatus for use with a toilet includes a bowl having an outwardly extending spout coupled by a flexible hose to a reservoir adapted to receive any excess water flowing out of the toilet. Means are also provided for closing off the water flow from the flushing source and/or the input water source so that the toilet cannot be flushed again until the cause for the overflow therein is cleared.

United States Patent 5632302
An overflow protection shut-off device for use with a water heater for shutting off a supply of water to the water heater when a leaking or an overflow condition occurs, the device including a valve mechanism coupleable to an input water line of a water heater and having an opened orientation for allowing flow of water within the input line and a closed orientation for preventing such flow; a water sensing mechanism positionable at a location proximal to the water heater for providing a signal when it is placed in contact with water when the water heater experiences the leaking or the overflow condition; and a switching mechanism coupled to the valve mechanism and the water sensing mechanism and with the switching mechanism being responsive to receipt of the signal from the water sensing mechanism for placing the valve mechanism in the closed orientation.

atsec information security corporation
9130 Jollyville Road, Suite 260
Austin, TX 78759
USA
Phone: +1-512-615-7300
Telefax: +1-512-615-7301
eMail: info@atsec.com

About atsec information security
atsec information security is an independent, standards-based information technology security services company that combines a business-oriented approach to information security with in-depth technical knowledge and global experience. atsec was founded in Munich (Germany) in 2000 and has extensive international operations with offices in the U.S., Germany and Sweden.
atsec offers evaluation and testing services leading to formal certification for IT security including evaluation under Common Criteria schemes in the U.S., Germany, and Sweden; cryptographic module and algorithm testing under the Cryptographic Module Validation Program of the National Institute of Standards and Technology (NIST) in the U.S. and Communications Security Establishment Canada (CSEC) in Canada; and compliance validation to the Payment Card Industry (PCI) Data Security Standard.
atsec also offers secure code review, ISO/IEC 27001 ISMS consulting, and penetration testing and scanning services.
atsec works with leading global companies such as IBM, HP, Oracle, Cray, BMW, SGI, Vodafone, Swisscom, RWE, and Wincor-Nixdorf.

This release was published on openPR.

Permanent link to this press release:

Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.

You can edit or delete your press release atsec scientists find the ultimate buffer overflow protection here

News-ID: 41050 • Views:

More Releases from atsec information security

atsec information security is now operating a Certification Body accredited according to ISO/IEC 17065
atsec information security is now operating a Certification Body accredited acco …
AUSTIN, TX - atsec is pleased to announce that atsec information security AB has been accredited as a certification body by SWEDAC, the national accreditation body in Sweden, to provide Common Criteria (CC) certifications of IT products. With over 20 years of experience as a CC evaluation lab, atsec has taken the step to become a CC certification body. We have an experienced and knowledgeable team, that has helped many national schemes
Call for Papers for the Second International Cryptographic Module Conference
Mark Your Calendar: ICMC 2014, November 19-21, Hilton Washington D.C., Rockville, MD ICMC brings together experts from around the world to confer on the topic of cryptographic modules, with emphasis on their secure design, implementation, assurance, and use, referencing both new and established standards such as FIPS 140-2 and ISO/IEC 19790. We are focused on attracting participants from the engineering and research community, test laboratories, government organizations, the procurers, deployers and administrators
atsec information security Opens South East Asia Office
atsec information security Opens South East Asia Office
Bangkok, Thailand – atsec information security is pleased to announce the opening of its atsec South East Asia (atsec SEA) office in Bangkok, Thailand. Since the year 2000, the atsec group of companies have been established experts in information security including Common Criteria, FIPS 140-2, PCI, ISO 27001, and hardware testing. As part of the atsec group of companies, atsec SEA’s objective is to promote information security and information assurance in
atsec completes FIPS 140-2 testing of Watchdata's WatchKey USB Token at Security Level 2
atsec completes FIPS 140-2 testing of Watchdata's WatchKey USB Token at Security …
Austin, TX - atsec information security is pleased to announce that its customer, Watchdata Technologies Pte Ltd. (branded as “Watchdata”), received a FIPS 140-2 validation certificate #1640 for the WatchKey USB Token under the CMVP (Cryptographic Module Validation Program) by the National Institute of Standards and Technology (NIST), USA and the Communication Security Establishment of Canada (CSEC). The successful validation result is published on the CMVP’s official website at: http://csrc.nist.gov/groups/STM/cmvp/validation.html The issued

All 5 Releases


More Releases for Patent

iFLY/SkyVenture patent restricted by European Patent Office
Gladbeck, 21 September 2016. In the patent invalidity attack of the German manufacturer of freefall simulators, Indoor Skydiving Germany Group (ISG) against its US competitor iFLY/S Skyventure International (UK) Ltd (iFLY), the European Patent Office ruled in favor of ISG and restricted the relevant parts of iFLY´s European Patent No. EP 2 287 073. iFly may choose to appeal this decision. ISG, German manufacturer of high performance freefall simulators for professional
Rebecca Klemm Issued Puzzle Patent: Polygon Puzzle and Related Methods, Patent N …
NumbersAlive! is pleased to announce that its founder, Rebecca Klemm, Ph.D., received her first US utility patent on August 2nd. The newly issued patent protects Dr. Klemm’s process of forming puzzles by decomposing shapes into smaller components with a mathematical correlation to the original. The patent additionally protects providing a base with cutouts to receive the original shapes that may be assembled from decomposed components. Finally, the patent protects the use
Patent Drafting Program
PATENT DRAFTING PROGRAM AT IIPTA By Rachana February 06, 2013 Delhi, Indian Institute of Patent and Trademark Attorney announces the introduction of Patent Drafting Program as one among the many Intellectual Property related programs offered by the company. This program is focussed mainly on providing an in-depth understanding and writing of patent language in an advanced level.
American Megatrends Announces US Patent Awards for 2011, Reaches 200 Patent Mile …
NORCROSS, GEORGIA – Continuing its long tradition of excellence in BIOS, remote management and network storage innovations, American Megatrends (AMI) is pleased to announce its latest round of patent awards. AMI has received an impressive total of 51 U.S. patents from December 28, 2010 through December 20, 2011. Notably, a total of 23 AMI engineers in collaboration across the globe were directly involved in the research and development of the patented
Intellectual Property Law Departments decrease Patent Staff, yet Patent Efficien …
ipPerformance Group, a leader in benchmarking corporate intellectual property law and management operations announces the release of its 2012 Intellectual Property Law Department study. While there was an increase in innovation activity worldwide throughout 2010 and 2011, companies reported decreased numbers of in-house IP Attorneys and IP Staff. The total IP Staff and Attorneys worldwide is down 18%; with the decrease in staff being compensated for with increased law
ParkerVision’s Telecom Patent Portfolio Honored Among Patent Board’s Top 30
Wireless technology firm leads telecom sector in three of six categories JACKSONVILLE, Fla., Jan. 20, 2012 – ParkerVision, Inc. (Nasdaq: PRKR), a developer and marketer of semiconductor technology solutions for wireless applications, again is ranked among The Patent Board’s top 30 strongest patent portfolios in the wireless and telecom industry, including leading the telecom sector with first place rankings in three of six scoring criteria. The ranking is based on The Patent