A Proposal of a System for Detecting Buffer Overflow with Detecting Alteration of Data
نویسندگان
چکیده
Numerous security technologies which detect buffer overflow have already proposed. Almost these technologies detect if buffer overflows happen or not, but don’t detect alteration of variable integrity. But there are attacks which are not be able to be defenced unless the technology detect alteration of variable integrity. So in this paper, we propose a system which detect alteration of variable integrity. Some exinting technologies could be bypassed if the attacker can see the user memory, but our proposed system can’t be bypassed even if the attacker can see the user memory. And our proposed system can restore data which is altered by attackers using buffer overflow. 1 はじめに 近年,バッファオーバフローの脆弱性を利用した 攻撃が蔓延している.ICATの調査報告によると,こ こ 4年間で発見された脆弱性のうち 20%がバッファ オーバフローに関する脆弱性である.バッファオー バフローを利用すると,プログラム内の関数の戻り アドレスやポインタ変数を書き換えることで悪意の ある攻撃者が任意のコードを実行することが可能で ある. バッファオーバフローの脆弱性はCやC++によっ て書かれた実行コードに多く存在する.しかし,C やC++によって書かれた実行コードはすばやく動作
منابع مشابه
Network-Based Buffer Overflow Detection by Exploit Code Analysis
Buffer overflow attacks continue to be a major security problem and detecting attacks of this nature is therefore crucial to network security. Signature based network based intrusion detection systems (NIDS) compare network traffic to signatures modelling suspicious or attack traffic to detect network attacks. Since detection is based on pattern matching, a signature modelling the attack must e...
متن کاملBuffer Overflow Attack Blocking Using MCAIDS- Machine Code Analysis Intrusion Detection System
MCAIDS-Machine Code Analysis Intrusion Detection System for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. With the increasing access of Internet,the Internet threat takes a form of attack, targetting individuals users to gain control over network and data. Buffer overlow is one of the most occuring security vulnerability in c...
متن کاملStatically Detecting Likely Buffer Overflow Vulnerabilities
Buffer overflow attacks may be today’s single most important security threat. This paper presents a new approach to mitigating buffer overflow vulnerabilities by detecting likely vulnerabilities through an analysis of the program source code. Our approach exploits information provided in semantic comments and uses lightweight and efficient static analyses. This paper describes an implementation...
متن کاملSTACKFENCES: A Run-Time Approach for Detecting Stack Overflows
This paper describes StackFences, a run-time technique for detecting overflows in local variables in C programs. This technique is different from all others developed so far because it tries to detect explicit overflow occurrences, instead of detecting if a particular stack value, namely a return address, was corrupted because of a stack overflow. Thus, StackFences is useful not only for detect...
متن کاملData Fusion and Multi-Criteria Decision Making for Producing Oil and Gas Resources Potential Maps (Case Study: Saracheh Zone, Qom Province)
This paper focuses on the application of Geoinformatic methods (simultaneous using of remote sensing, geographic information system, global positioning system, terrestrial and aerial photogrammetry) in optimal operation and exploration risk reduction of oil and gas reservoirs. To approach the purpose, two aspects of remote sensing (satellite image) and terrestrial and aerial photogrammetry have...
متن کامل