Libsafe: Transparent System-wide Protection Against Buffer Overflow Attacks
نویسندگان
چکیده
Libsafe is a practical solution that protects against the most common forms of buffer overflow attacks. Such attacks often result in granting the attacker full privileges on the target system. Libsafe is implemented as a shared library that intercepts calls to vulnerable standard library functions. Based on an inspection of the process stack and the function arguments, Libsafe ensures that no return addresses can be overwritten, thus preventing the most common form of buffer overflow attack. Although security concerns encompass a wide range of issues and vulnerabilities, perhaps the most commonly exploited vulnerability is the buffer overflow vulnerability. Advisories issued by leading security organizations include many warnings about buffer overflow problems. Buffer overflows are significant in several ways. First, the most common outcome of a successful attack is a root shell, which is an interactive shell with root privileges. With a root shell, the attacker is able to modify or view files, install back doors, or set up further attacks, such as distributed denial of service attacks. Second, many buffer overflows can be triggered remotely by targeting commonly provided services. Since the attack is carried out at the application level, firewalls are useless in preventing attacks against required services. Third, the proliferation of exploit code permits even unsophisticated attackers to perpetrate buffer overflow attacks. The main problem underlying buffer overflows is bad programming. A common data structure is the buffer or array. When the buffer contains characters, it is called a string. Consider the following example, which contains a buffer overflow vulnerability. char *src = "hello world";
منابع مشابه
Libsafe: Protecting Critical Elements of Stacks
The exploitation of buffer overflow vulnerabilities in process stacks constitutes a significant portion of security attacks. We present a new method to detect and handle such attacks. In contrast to previous methods, this new method works with any existing pre-compiled executable and can be used transparently, even on a system-wide basis. The method intercepts all calls to library functions tha...
متن کاملDefending Embedded Systems Against Buffer Overflow via Hardware/Software
Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded systems against buffer overflow attacks. In this paper, we propose the Hardware/Software Address Protection (HSAP) technique to solve this problem. We first classify buffer overflow attacks into two categories (stack s...
متن کاملDetecting Heap Smashing Attacks through Fault Containment Wrappers
Buffer overflow attacks are a major cause of security breaches in modern operating systems. Not only are overflows of buffers on the stack a security threat, overflows of buffers kept on the heap can be too. A malicious user might be able to hijack the control flow of a root-privileged program if the user can initiate an overflow of a buffer on the heap when this overflow overwrites a function ...
متن کاملA Processor Architecture Defense against Buffer Overflow Attacks
Buffer overflow vulnerabilities in the memory stack continue to pose serious threats to network and computer security. By exploiting these vulnerabilities, a malicious party can strategically overwrite the return address of a procedure call, obtain control of a system, and subsequently launch more virulent attacks. Software countermeasures for such intrusions entail modifications to application...
متن کاملA Lightweight Buffer Overflow Protection Mechanism with Failure-Oblivious Capability
Buffer overflow has become a major source of network security vulnerability. Traditional schemes for detecting buffer overflow attacks usually terminate the attacked service, degrading the service availability. In this paper, we propose a lightweight buffer overflow protection mechanism that allows continued network service. The proposed mechanism allows a service program to reconfigure itself ...
متن کامل