作者: J. Pincus , B. Baker
DOI: 10.1109/MSP.2004.36
关键词: Vulnerability 、 Blaster 、 Computer science 、 Exploit 、 The Internet 、 Heap (data structure) 、 Pointer (computer programming) 、 Computer security 、 Stack buffer overflow
摘要: Security vulnerabilities related to buffer overruns account for the largest share of CERT advisories, as well high-profile worms - from original Internet Worm in 1987 through Blaster's appearance 2003. When malicious crackers discover a vulnerability, they devise exploits that take advantage vulnerability attack system. The article describes three powerful general-purpose families overruns: arc injection, pointer subterfuge, and heap smashing. These new techniques go beyond traditional "stack smashing" invalidate assumptions about overruns.