Beyond stack smashing: recent advances in exploiting buffer overruns

作者: J. Pincus , B. Baker

DOI: 10.1109/MSP.2004.36

关键词: VulnerabilityBlasterComputer scienceExploitThe InternetHeap (data structure)Pointer (computer programming)Computer securityStack buffer overflow

摘要: Security vulnerabilities related to buffer overruns account for the largest share of CERT advisories, as well high-profile worms - from original Internet Worm in 1987 through Blaster's appearance 2003. When malicious crackers discover a vulnerability, they devise exploits that take advantage vulnerability attack system. The article describes three powerful general-purpose families overruns: arc injection, pointer subterfuge, and heap smashing. These new techniques go beyond traditional "stack smashing" invalidate assumptions about overruns.

参考文章(9)
Chris Anley, David Litchfield, Dave Aitel, Riley Hassell, Jack Koziol, Sinan Eren, Neel Mehta, The Shellcoder's Handbook: Discovering and Exploiting Security Holes ,(2004)
Gary McGraw, Greg Hoglund, Exploiting Software: How to Break Code ,(2004)
Mariam Kamkar, John Wilander, A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention network and distributed system security symposium. pp. 149- ,(2003)
Perry Wagle, Jonathan Walpole, Calton Pu, Steve Beattie, Aaron Grier, Crispin Cowan, Heather Hintony, Qian Zhang, Peat Bakke, Dave Maier, StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks usenix security symposium. pp. 5- 5 ,(1998)
Paul R Wilson, Mark S Johnstone, Michael Neely, David Boles, None, Dynamic Storage Allocation: A Survey and Critical Review international symposium on memory management. pp. 1- 116 ,(1995) , 10.1007/3-540-60368-9_19
C. Cowan, F. Wagle, Calton Pu, S. Beattie, J. Walpole, Buffer overflows: attacks and defenses for the vulnerability of the decade darpa information survivability conference and exposition. ,vol. 2, pp. 119- 129 ,(2000) , 10.1109/DISCEX.2000.821514
C. Cowan, P. Wagle, C. Pu, S. Beattie, J. Walpole, Buffer overflows: attacks and defenses for the vulnerability of the decade Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems]. pp. 227- 237 ,(2003) , 10.1109/FITS.2003.1264935
A. One, Smashing The Stack For Fun And Profit Phrack. ,vol. 7, ,(1996)