Back to Search Start Over

DETECTION AND PREVENTION OF STACK BUFFER OVERFLOW ATTACKS.

Authors :
Kuperman, Benjamin A.
Brodley, Carla E.
Ozdoganoglu, Hilmi
Vijaykumar, T. N.
Jalote, Ankit
Source :
Communications of the ACM. Nov2005, Vol. 48 Issue 11, p51-56. 6p. 1 Diagram.
Publication Year :
2005

Abstract

The article discusses how to mitigate remote attacks that exploit buffer overflow vulnerabilities on the stack and enable attackers to take control of a computer program. A buffer overflow occurs during program execution when a fixed-size buffer has had too much data copied into it. This causes the data to overwrite into adjacent memory locations and, depending on what is stored there, the behavior of the program itself might be affected. Buffer overflow attacks can take place in processes that use a stack during program execution. A buffer overflow usually contains both executable code and the address where that code is stored on the stack. The data used to overflow is often a single string constructed by the attacker, with the executable code first, followed by enough repetitions of the target address that the RA is overwritten. This attack strategy requires the attacker to know exactly where the executable code is stored, otherwise, the attack will fail. As prevention methods have been developed and attacks have become more sophisticated over the past 20 years, many variants of the basic buffer overflow attack have been developed by both attackers and researchers to bypass protection methods.

Details

Language :
English
ISSN :
00010782
Volume :
48
Issue :
11
Database :
Academic Search Index
Journal :
Communications of the ACM
Publication Type :
Periodical
Accession number :
18740803
Full Text :
https://doi.org/10.1145/1096000.1096004