Jump to content
Nytro

Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade

Recommended Posts

Buffer Overflows:

Attacks and Defenses for the Vulnerability of the Decade

rispin Cowan, Perry Wagle, Calton Pu,Steve Beattie, and Jonathan Walpole

Department of Computer Science and Engineering

Oregon Graduate Institute of Science

&

Technology

(crispin@cse.ogi.edu)

http://www.cse.ogi.edu/DISC/projects/immunix

1

Abstract

Buffer overflows have been the most common

form of security vulnerability for the last ten

years. More over, buffer overflow vulnerabilities

dominate the area of remote network penetra-

tion vulnerabilities, where an anonymous Inter-

net user seeks to gain partial or total control of

a host. If buffer overflow vulnerabilities could

be effectively eliminated, a very large portion of

the most serious security threats would also be

eliminated. In this paper, we survey the various

types of buffer overflow vulnerabilities and

attacks, and survey the various defensive mea-

sures that mitigate buffer overflow vulnerabili-

ties, including our own StackGuard method. We

then consider which combinations of techniques

can eliminate the problem of buffer overflow

vulnerabilities, while preserving the functional-

ity and performance of existing systems

Download:

http://css.csail.mit.edu/6.858/2011/readings/buffer-overflows.pdf

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...