DocumentCode :
2858225
Title :
Evolving successful stack overflow attacks for vulnerability testing
Author :
Kayacik, H. Gunes ; Zincir-Heywood, A. Nur ; Heywood, Malcolm
Author_Institution :
Fac. of Comput. Sci., Dalhousie Univ., Halifax, NS
fYear :
2005
fDate :
5-9 Dec. 2005
Lastpage :
234
Abstract :
The work presented in this paper is intended to test crucial system services against stack overflow vulnerabilities. The focus of the test is the user-accessible variables, that is to say, the inputs from the user as specified at the command line or in a configuration file. The tester is defined as a process for automatically generating a wide variety of user-accessible variables that result in malicious buffers (an exploit). In this work, the search for successful exploits is formulated as an optimization problem and solved using evolutionary computation. Moreover the resulting attacks are passed through the Snort misuse detection system to observe the detection (or not) of each exploit
Keywords :
evolutionary computation; optimisation; security of data; Snort misuse detection system; crucial system service; evolutionary computation; malicious buffer; optimization problem; stack overflow attack; stack overflow vulnerability; Assembly; Automatic testing; Buffer overflow; Buffer storage; Cost function; Detectors; Evolutionary computation; Intrusion detection; Runtime; System testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 21st Annual
Conference_Location :
Tucson, AZ
ISSN :
1063-9527
Print_ISBN :
0-7695-2461-3
Type :
conf
DOI :
10.1109/CSAC.2005.23
Filename :
1565250
Link To Document :
بازگشت