overflow attack:A potential problem and its Implications
you ever thought of a buffer overflow attack ? It occurs through careless programming
and due to patchy nature of the programs. Many C programs have buffer overflow
vulnerabilities because the C language lacks array bounds checking, and the culture
of C programmers encourages a performance-oriented style that avoids error checking
where possible. Eg: gets and strcpy ( no bounds checking ). This paper presents
a systematic solution to the persistent problem of buffer overflow attacks. Buffer
overflow attack gained notoriety in 1988 as part of the Morris Worm
on the Internet. These problems are probably the result of careless programming,
and could be corrected
by elementary testing or code reviews along the way.
THE ATTACK :- A (malicious) user finds the vulnerability in a highly privileged
program and someone else implements a patch to that particular attack, on that
privileged program. Fixes to buffer overflow attacks attempt to solve the problem
at the source (the vulnerable program) instead of at the destination (the stack
that is being overflowed).
:- It is a simple compiler extension that limits the amount of damage that a buffer
overflow attack can inflict on a program. The paper discusses the various intricacies
to the problem and the implementation details of the Compiler extension 'Stack
Stack Smashing Attack
:- Buffer overflow attacks exploit a lack of bounds checking on the size of input
being stored in a buffer array. The most common data structure to corrupt in this
fashion is the stack, called a ``stack smashing attack'' .
For Network Access :- The paper also discusses the impacts on network access to
the 'Buffer Overflow Attack'.
prevents changes to active return addresses by either :-
1. Detecting the
change of the return address before the function returns, or
preventing the write to the return address. MemGuard is a tool developed
help debug optimistic specializations by locating code statements that change
" Canary StackGuard Overhead
" MemGuard StackGuard Overhead
" StackGuard Macrobenchmarks
paper presents the issues and their implications on the 'IT APPLICATIONS' and
discusses the solutions through implementation details of 'Stack Guard'.
You may also like this : Sniffer for detecting lost mobiles, Mobile Phone Cloning, Nano Cars Into The Robotics , Mind-Reading Computer, Intelligent Speed Adaptation , Global Wireless E-Voting , E-Cash Payment System , Cyborgs, Brain Fingerprinting , Biometrics in SECURE e-transaction , X- Internet , Surface Computer, Green Cloud , Digital Jewelry , Brain Gate , Palm Vein Technology , 5 Pen PC Technology , iDEN , Hi-Fi, Packet Sniffers, Brain Chips , Phishing , Pill Camera, Blue Brain , Biometric Voting System , 3D Television , 3D password, Gi-Fi , Graphical Password Authentication, 4G Broadband , Finger Tracking , Eye Movement-Based Human Computer Interaction Techniques , Ethical Hacking, Secure ATM by Image Processing , Dynamic Languages ,In-Vehicle Networking , Plastic Memory , Protein Memory , Setting up a LAN using Linux , UMTS , Money Pad, The Future Wallet , Low Power UART Design , SPECT , Buffer overflow attack , Hurd , Intel Centrino Mobile Technology , MPEG Video Compression , Survivable Networks Systems , Self Organizing Maps , Mobile IP,IT Seminar Reports, PPT and PDF.