Title :
Evolving successful stack overflow attacks for vulnerability testing
Author :
Kayacik, H. Gunes ; Zincir-Heywood, A. Nur ; Heywood, Malcolm
Author_Institution :
Fac. of Comput. Sci., Dalhousie Univ., Halifax, NS
Abstract :
The work presented in this paper is intended to test crucial system services against stack overflow vulnerabilities. The focus of the test is the user-accessible variables, that is to say, the inputs from the user as specified at the command line or in a configuration file. The tester is defined as a process for automatically generating a wide variety of user-accessible variables that result in malicious buffers (an exploit). In this work, the search for successful exploits is formulated as an optimization problem and solved using evolutionary computation. Moreover the resulting attacks are passed through the Snort misuse detection system to observe the detection (or not) of each exploit
Keywords :
evolutionary computation; optimisation; security of data; Snort misuse detection system; crucial system service; evolutionary computation; malicious buffer; optimization problem; stack overflow attack; stack overflow vulnerability; Assembly; Automatic testing; Buffer overflow; Buffer storage; Cost function; Detectors; Evolutionary computation; Intrusion detection; Runtime; System testing;
Conference_Titel :
Computer Security Applications Conference, 21st Annual
Conference_Location :
Tucson, AZ
Print_ISBN :
0-7695-2461-3
DOI :
10.1109/CSAC.2005.23