Back to Search
Start Over
DETECTION AND PREVENTION OF STACK BUFFER OVERFLOW ATTACKS.
- Source :
-
Communications of the ACM . Nov2005, Vol. 48 Issue 11, p51-56. 6p. 1 Diagram. - Publication Year :
- 2005
-
Abstract
- The article discusses how to mitigate remote attacks that exploit buffer overflow vulnerabilities on the stack and enable attackers to take control of a computer program. A buffer overflow occurs during program execution when a fixed-size buffer has had too much data copied into it. This causes the data to overwrite into adjacent memory locations and, depending on what is stored there, the behavior of the program itself might be affected. Buffer overflow attacks can take place in processes that use a stack during program execution. A buffer overflow usually contains both executable code and the address where that code is stored on the stack. The data used to overflow is often a single string constructed by the attacker, with the executable code first, followed by enough repetitions of the target address that the RA is overwritten. This attack strategy requires the attacker to know exactly where the executable code is stored, otherwise, the attack will fail. As prevention methods have been developed and attacks have become more sophisticated over the past 20 years, many variants of the basic buffer overflow attack have been developed by both attackers and researchers to bypass protection methods.
Details
- Language :
- English
- ISSN :
- 00010782
- Volume :
- 48
- Issue :
- 11
- Database :
- Academic Search Index
- Journal :
- Communications of the ACM
- Publication Type :
- Periodical
- Accession number :
- 18740803
- Full Text :
- https://doi.org/10.1145/1096000.1096004