A Tour Beyond BIOS - Mitigate Buffer Overflow in
CtrlK
  • A Tour Beyond BIOS - Security Enhancement to Mitigate Buffer Overflow in UEFI
    • Executive Summary
  • Stack Canaries
    • Stack Check Support in Microsoft Visual Studio
    • Stack Check Support in GCC
    • Enable Stack Check in EDK II
    • Future work
  • Data Execution Protection
    • DEP in X86 Processor
    • DEP in UEFI specification
    • Enable DEP in EDK II
    • Future work
  • Address Space Layout Randomization
    • ASLR in Windows
    • ASLR in *nix
    • ASLR requirement in UEFI firmware
    • Enable ASLR for UEFI in EDK II
    • Enable ASLR for SMM in EDK II
    • Future work
  • Additional Overflow Detection
    • Stack Overflow Detection
    • Heap Management in EDKII
    • Heap Overflow Detection (for Page)
    • Heap Overflow Detection (for Pool)
    • NULL Pointer Protection in EDK II
    • Read-only page table
    • Limitation
    • Compatibility Consideration
    • Call for action
    • Future work
  • Summary
    • Policy Control
  • References
Powered by GitBook
On this page

Was this helpful?

  1. Data Execution Protection

DEP in UEFI specification

The Unified Extensible Firmware Interface (UEFI) [www.uefi.org] specification allows “Stack may be marked as non-executable in identity mapped page tables.” UEFI also defines EFI_MEMORY_ATTRIBUTES_TABLE to let the OS know which addresses represent runtime code pages and runtime data pages, respectively. As such, the OS may refer to this information in order to setup the protection during OS runtime. The details of this design are discussed in the white paper, A Tour Beyond BIOS Memory Map And Practices in UEFI BIOS .

PreviousDEP in X86 ProcessorNextEnable DEP in EDK II

Last updated 5 years ago

Was this helpful?