GAO-01-1073T Information Security: Code Red, Code Red II, and SirCam Attacks Highlight Need for Proactive Measures
ثبت نشده
چکیده
منابع مشابه
Dwarf Frankenstein is still in your memory: tiny code reuse attacks
Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...
متن کاملSide channel parameter characteristics of code injection attacks
Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...
متن کاملAggrandizing the beast's limbs: patulous code reuse attack on ARM architecture
Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...
متن کاملDesigning Security into Software with Patterns
Software is a major problem when trying to provide a secure computing environment. Vulnerabilities from software defects can compromise a company's resources and damage their reputation through loss of customer records. The best solution is to eliminate all vulnerabilities through good coding practices and software testing. In addition, legacy software needs to be re-engineered to protect exist...
متن کاملPast Approaches: First and Second Generation Security Technologies
The frequency and severity of cyber attacks on US commercial and military systems have been on the rise, paralleling the increasing interconnectedness of information systems. Code Red and its variants alone were responsible for infecting nearly a million servers and causing over $4 Billion in damage in the US in the summer of 2001, according to GAO report [1]. This was despite a rather benign p...
متن کامل