Nytro Posted July 18, 2013 Report Posted July 18, 2013 Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decaderispin Cowan, Perry Wagle, Calton Pu,Steve Beattie, and Jonathan WalpoleDepartment of Computer Science and EngineeringOregon Graduate Institute of Science & Technology(crispin@cse.ogi.edu)http://www.cse.ogi.edu/DISC/projects/immunix— 1 —AbstractBuffer overflows have been the most commonform of security vulnerability for the last tenyears. More over, buffer overflow vulnerabilitiesdominate the area of remote network penetra-tion vulnerabilities, where an anonymous Inter-net user seeks to gain partial or total control ofa host. If buffer overflow vulnerabilities couldbe effectively eliminated, a very large portion ofthe most serious security threats would also beeliminated. In this paper, we survey the varioustypes of buffer overflow vulnerabilities andattacks, and survey the various defensive mea-sures that mitigate buffer overflow vulnerabili-ties, including our own StackGuard method. Wethen consider which combinations of techniquescan eliminate the problem of buffer overflowvulnerabilities, while preserving the functional-ity and performance of existing systemsDownload:http://css.csail.mit.edu/6.858/2011/readings/buffer-overflows.pdf Quote