overflow attack:A potential problem and its Implications
you ever thought of a buffer overflow attack ? It occurs through careless programming
and due to patchy nature of the programs. Many C programs have buffer overflow
vulnerabilities because the C language lacks array bounds checking, and the culture
of C programmers encourages a performance-oriented style that avoids error checking
where possible. Eg: gets and strcpy ( no bounds checking ). This paper presents
a systematic solution to the persistent problem of buffer overflow attacks. Buffer
overflow attack gained notoriety in 1988 as part of the Morris Worm
on the Internet. These problems are probably the result of careless programming,
and could be corrected
by elementary testing or code reviews along the way.
THE ATTACK :- A (malicious) user finds the vulnerability in a highly privileged
program and someone else implements a patch to that particular attack, on that
privileged program. Fixes to buffer overflow attacks attempt to solve the problem
at the source (the vulnerable program) instead of at the destination (the stack
that is being overflowed).
:- It is a simple compiler extension that limits the amount of damage that a buffer
overflow attack can inflict on a program. The paper discusses the various intricacies
to the problem and the implementation details of the Compiler extension 'Stack
Stack Smashing Attack
:- Buffer overflow attacks exploit a lack of bounds checking on the size of input
being stored in a buffer array. The most common data structure to corrupt in this
fashion is the stack, called a ``stack smashing attack'' .
For Network Access :- The paper also discusses the impacts on network access to
the 'Buffer Overflow Attack'.
prevents changes to active return addresses by either :-
1. Detecting the
change of the return address before the function returns, or
preventing the write to the return address. MemGuard is a tool developed
help debug optimistic specializations by locating code statements that change
" Canary StackGuard Overhead
" MemGuard StackGuard Overhead
" StackGuard Macrobenchmarks
paper presents the issues and their implications on the 'IT APPLICATIONS' and
discusses the solutions through implementation details of 'Stack Guard'.
You may also like this : 4G Broadband seminar report, Finger Tracking In Real Time Human Computer Interaction, Eye Movement-Based Human Computer Interaction Techniques, Ethical Hacking, E-Cash Payment System PPT, Cyborgs, Brain Fingerprinting Biometrics in SECURE e-transaction, X- Internet, Surface Computer, Secure ATM by Image Processing, Mobile Ad-Hoc Networks Extensions to Zone Routing Protocol, Wibree PDF , Telepresence, System in Package, Smart Memories, Slammer Worm, Sensitive Skin, Pixie Dust, Linux Kernel 2.6, Lamp Technology, Humanoid Robot, HTAM, Haptic Technology, Elastic Cluster, Digital Scent Technology, Distributed Interactive Virtual Environment, Dynamic TCP Connection Elapsing, CAPTCHA, Virtual Retinal Display, Wireless LAN Security, Chameleon Chip, Haptics, Intelligent RAM, iSCSI, Linux Kernel 2.6, 3D Searching, Biological Computers, Rain Technology, Real Time Application Interface, GPS, HALO , BitTorrent, Compositional Adaptation, Rover Technology,Computer Seminars
Labels : Software Engineering Seminar Topics, General Seminar Topics for Computer Science(CSE), Advanced Seminar Topics Computer Science(CSE), Computer Science(CSE) Seminar Topics Full Reports Presentations, Computer Science(CSE) IEEE Seminar Topics, Computer Science(CSE) Seminar Topics with Abstract, Computer Science(CSE) Seminar Topics 2011|2010|2012|2009, Computer Science(CSE) Paper Presentations 2011, Computer Science(CSE),IT and MCA Seminar Topics|Reports|PPT|PDF, MCA Seminar Topics Latest, Latest MCA Seminar Topics 2012|2011|2010|2009, MCA Seminar Topics Free Download, MCA Seminar Topics with Abstract, MCA Seminar Topics 2009|2010|2011|2012, Advanced MCA Seminar Topics