ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술대회 A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation
Cited 1 time in scopus Download 1 time Share share facebook twitter linkedin kakaostory
저자
최양서, 서동일, 손승원
발행일
200112
출처
International Conference on Information Security and Cryptology (ICISC) 2001 (LNCS 2288), v.2288, pp.146-159
초록
Stack buffer overflow hacking became generally known due to the Morris?? Internet Worm in 1988. Since then buffer overflow hacking has been used to attack systems and servers by hackers very frequently. Recently, many researches tried to prevent it, and several solutions were developed such as Libsafe and StackGuard; however, these solutions have a few problems. In this paper we present a new stack buffer overflow attack prevention technique that uses the system call monitoring mechanism and memory address where the system call is made. Because of its detection mechanism this system can be used for unknown attack detection, too.
KSP 제안 키워드
Attack Detection, Attack prevention, Buffer overflow attack, Internet Worm, Memory address, Stack buffer overflow, System calls, detection mechanism