Buffer
Overflow Defenses. ©2002, Jedidiah R. Crandall, Susan L. Gerhart, Jan G. Hogle.
http://sfsecurity.pr.erau.edu.
Operating system tools
•Disable
execution of code outside the code space – It is possible on some architectures to distinguish between code and data and not allow data to be executed as code.
•Intrusion
detection systems – These are programs that
watch for abnormal behavior or behavior that is similar to attack behavior.
•Generation
of an interrupt – With hardware support it is
possible to set bounds on a buffer and generate
an interrupt when an attempt is made to access
or change memory outside those bounds.