Title :
Buffer Overflow Exploit and Defensive Techniques
Author :
Desheng Fu ; Feiyue Shi
Author_Institution :
Sch. of Comput. & Software, Nanjing Univ. of Inf. Sci. & Technol., Nanjing, China
Abstract :
Buffer overflow attack is most common and dangerous attack method at present. So the analysis is useful in studying the principle of buffer overflow and buffer overflow exploits. In the paper a didactic example is included to illustrate one method of buffer overflow exploits, and though adding a jmp esp instruction into the process space as a springboard, it makes the shell code successfully to be executed. Finally, an overview for protecting and defending against buffer overflow is summarized.
Keywords :
security of data; buffer overflow attack; buffer overflow exploits; dangerous attack method; defensive technique; shell code; Arrays; Buffer overflows; Computers; Educational institutions; Registers; Runtime; Security; buffer overflow; defensive techniques; exploits; shellcode; stack frame;
Conference_Titel :
Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on
Conference_Location :
Nanjing
Print_ISBN :
978-1-4673-3093-0
DOI :
10.1109/MINES.2012.81