Buffer overflows: attacks and defenses for the vulnerability of the decade
- 7 November 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 2, 119-129
- https://doi.org/10.1109/discex.2000.821514
Abstract
Buffer overflows have been the most common form of security vulnerability for the last ten years. More over, buffer overflow vulnerabilities dominate the area of remote network penetra- tion vulnerabilities, where an anonymous Inter- net user seeks to gain partial or total control of a host. If buffer overflow vulnerabilities could be effectively eliminated, a very large portion of the most serious security threats would also be eliminated. In this paper, we survey the various types of buffer overflow vulnerabilities and attacks, and survey the various defensive mea- sures that mitigate buffer overflow vulnerabili- ties, including our own StackGuard method. We then consider which combinations of techniques can eliminate the problem of buffer overflow vulnerabilities, while preserving the functional- ity and performance of existing systems.Keywords
This publication has 5 references indexed in Scilit:
- Java security: from HotJava to Netscape and beyondPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- An automated approach for identifying potential vulnerabilities in softwarePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Death, taxes, and imperfect softwarePublished by Association for Computing Machinery (ACM) ,1998
- Optimistic incremental specializationPublished by Association for Computing Machinery (ACM) ,1995
- Technical and socio-economic aspects of solar energy and rural development in developing countriesSolar Energy, 1977