DocumentCode
588752
Title
Buffer Overflow Exploit and Defensive Techniques
Author
Desheng Fu ; Feiyue Shi
Author_Institution
Sch. of Comput. & Software, Nanjing Univ. of Inf. Sci. & Technol., Nanjing, China
fYear
2012
fDate
2-4 Nov. 2012
Firstpage
87
Lastpage
90
Abstract
Buffer overflow attack is most common and dangerous attack method at present. So the analysis is useful in studying the principle of buffer overflow and buffer overflow exploits. In the paper a didactic example is included to illustrate one method of buffer overflow exploits, and though adding a jmp esp instruction into the process space as a springboard, it makes the shell code successfully to be executed. Finally, an overview for protecting and defending against buffer overflow is summarized.
Keywords
security of data; buffer overflow attack; buffer overflow exploits; dangerous attack method; defensive technique; shell code; Arrays; Buffer overflows; Computers; Educational institutions; Registers; Runtime; Security; buffer overflow; defensive techniques; exploits; shellcode; stack frame;
fLanguage
English
Publisher
ieee
Conference_Titel
Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on
Conference_Location
Nanjing
Print_ISBN
978-1-4673-3093-0
Type
conf
DOI
10.1109/MINES.2012.81
Filename
6405636
Link To Document