Uninformed: Informative Information for the Uninformed

Vol 7» 2007.May



Implementation

As was mentioned in the introduction, security solutions that are designed to protect against stack-based buffer overflows through the use of cookies tend to involve three distinct steps: cookie generation, prologue modifications, and epilogue modifications. Microsoft's GS implementation is no different. This chapter will describe each of these three steps independent of one another to paint a picture for how GS operates.



Subsections