CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Buffer Overflow Attack – Vulnerability in Stack

by P.Vadivel Murugan, Dr.K.Alagarsamy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 13 - Number 5
Year of Publication: 2011
Authors: P.Vadivel Murugan, Dr.K.Alagarsamy
10.5120/1780-2455

P.Vadivel Murugan, Dr.K.Alagarsamy . Buffer Overflow Attack – Vulnerability in Stack. International Journal of Computer Applications. 13, 5 ( January 2011), 1-2. DOI=10.5120/1780-2455

@article{ 10.5120/1780-2455,
author = { P.Vadivel Murugan, Dr.K.Alagarsamy },
title = { Buffer Overflow Attack – Vulnerability in Stack },
journal = { International Journal of Computer Applications },
issue_date = { January 2011 },
volume = { 13 },
number = { 5 },
month = { January },
year = { 2011 },
issn = { 0975-8887 },
pages = { 1-2 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume13/number5/1780-2455/ },
doi = { 10.5120/1780-2455 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:01:54.371072+05:30
%A P.Vadivel Murugan
%A Dr.K.Alagarsamy
%T Buffer Overflow Attack – Vulnerability in Stack
%J International Journal of Computer Applications
%@ 0975-8887
%V 13
%N 5
%P 1-2
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Most of the vulnerability based on buffer overflows aim at forcing the execution of malicious code, mainly in order to give a root shell to the user. The malicious instructions are stored in a buffer, which is overflowed to allow an unexpected use of the process, by changing various memory sections.

References
  1. Buffer Overflow Attacks on Linux Principles Analyzing and Protection Zhimin Gu Jiandong Yao Jun Qin Department of Computer Science, Beijing Institute of Technology (Beijing 100081)
  2. Computer emergency response team (cert).http://www.cert.org.The Meta sploit project. http:// www. metasploit. com
  3. RamKumar ChincChani and Eric Van Den Berg. A fast staticanalysis approach to detect exploit code inside network flows.In RAID, 2005.
  4. C. Kruegel, E. KirDa, D. Mutz, W. Robertson, and G. Vigna.Polymorphic worm detection using structural information ofexecutables. In RAID, 2005.
  5. Michalis Polychranakis, Kostas G. Anagnostakis, andEvangelos P. Markatos. Network Level Polymorphic Shellcode Detection using Emulation. DIMVA , 2006.
  6. XinRan Wang, ChiChun Pan, Peng Liu, and Sencun Zhu. Sig free: A signature Free Buffer Overflow Attack Blocker. In 15 th Use nix Security Symposium, July 2006.
  7. Navjot Singh Libsafe: Protecting CriticalElement of Stacks White Paper December25, 1999Litchfield, D. (1999).
  8. Exploiting Windows NT for Buffer Overruns. Posted to Bugtraq mailing list in May1999. http://www.infowar.co.uk/mnemonix/ntbufferoverruns.htm.Mudge. (1995). How to write Buffer Overflows. http:// l0pht. com/ advisories/bufero.html
  9. Smith, N.P. (1997). Stack smashing vulnerabilities in the UNIX operating system. Southern Connecticut State University. http:// destroy.net/ machines/ security/
  10. Summerfield, B. (1997) Re: Smashing the stack. From the Bugtraq mailing list. www. securityfocus. com / templates/ archive.pike 1997-01-21
  11. Spafford, E. H. (1988) The internet worm program: An analysis. ACM Computer Communication Review; 19(1), pp. 17-57. tp://www.cs.purdue.edu/homes/ spaf/techreps/823.ps.
  12. S. Alexander. Defeating compiler level buffer overflow protection. The USENIX Magazine, 30(3), June 2005.
  13. S. Nanda and T.C. Chiueh. Foreign code detection for Windows/X86 binaries. ECSL Technical report TR- 190, Computer Science Department,Stony Brook University, 2005.
  14. M. Rinard, C. Cadar, D. Roy, and D. Dumitran. A dynamic technique for eliminating buffer overflows vulnerabilities (and other memory errors). In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC), December 2004.
  15. Z. Liang, R. Sekar, and D.DuVarney. Automatic synthesis of filters to discard buffer overflow attacks: A step towards realizing self healing systems. In USENIX Annual Technical Conference, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Buffer overflow exploit stack allocation heap function memory allocation