• DocumentCode
    588752
  • Title

    Buffer Overflow Exploit and Defensive Techniques

  • Author

    Desheng Fu ; Feiyue Shi

  • Author_Institution
    Sch. of Comput. & Software, Nanjing Univ. of Inf. Sci. & Technol., Nanjing, China
  • fYear
    2012
  • fDate
    2-4 Nov. 2012
  • Firstpage
    87
  • Lastpage
    90
  • Abstract
    Buffer overflow attack is most common and dangerous attack method at present. So the analysis is useful in studying the principle of buffer overflow and buffer overflow exploits. In the paper a didactic example is included to illustrate one method of buffer overflow exploits, and though adding a jmp esp instruction into the process space as a springboard, it makes the shell code successfully to be executed. Finally, an overview for protecting and defending against buffer overflow is summarized.
  • Keywords
    security of data; buffer overflow attack; buffer overflow exploits; dangerous attack method; defensive technique; shell code; Arrays; Buffer overflows; Computers; Educational institutions; Registers; Runtime; Security; buffer overflow; defensive techniques; exploits; shellcode; stack frame;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on
  • Conference_Location
    Nanjing
  • Print_ISBN
    978-1-4673-3093-0
  • Type

    conf

  • DOI
    10.1109/MINES.2012.81
  • Filename
    6405636