Skip to main content

A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation

  • Conference paper
  • First Online:
Information Security and Cryptology — ICISC 2001 (ICISC 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2288))

Included in the following conference series:

Abstract

Stack buffer overflow hacking became generally known due to the Morris’ Internet Worm in 1988. Since then buffer overflow hacking has been used to attack systems and servers by hackers very frequently. Recently, many researches tried to prevent it, and several solutions were developed such as Libsafe and StackGuard; however, these solutions have a few problems. In this paper we present a new stack buffer overflow attack prevention technique that uses the system call monitoring mechanism and memory address where the system call is made. Because of its detection mechanism this system can be used for unknown attack detection, too.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Larry Boettger, “The Morris Worm: How it Affected Compter Security and Lessons Learnd by it”, SANS Institute White Paper, Dec. 2000.

    Google Scholar 

  2. Aleph One, “Smashing The Stack For Fun And Profit”, Phrack 49th Ed. File 14th of 16, Phrack.org, Nov. 1996

    Google Scholar 

  3. CERTCC-KR, “Hacking Statistics”, Korea Information Security Agency. 2001.

    Google Scholar 

  4. “IA-32 Intel Architecture Software Developer’s Manual. Volume 1-3”, Intel Corporation, 2000

    Google Scholar 

  5. Crispin Cowan, Steve Beattie, Ryan Finnin Day, Calton Pu, Perry Wagle, and Erik Walthinsen, “Protecting Systems from Stack Smashing Attacks with StackGuard”, Linux Expo, Raleigh, NC, May 1999.

    Google Scholar 

  6. Qian Zhang, “The Synthetix MemGuard Kernel Programmer’s Interface”, June 1997

    Google Scholar 

  7. Crispin Cowan, Tito Autrey, Charles Krasic, Cal-ton Pu, and Jonathan Walpole. Fast Concurrent Dynamic Linking for an Adaptive Operating System. In International Conference on Configurable Distributed Systems (ICCDS’96), Annapolis, MD, May 1996.

    Google Scholar 

  8. Crispin Cowan, Andrew Black, Charles Krasic, Calton Pu, Jonathan Walpole, Charles Consel, and Eugen-Nicolae Volanschi. Specialization Classes: An Object Framework for Specialization. In Proceedings of the Fifth International Workshop on Object-Orientation in Operating Systems (IWOOOS’ 96), Seattle, WA, October 27–28 1996.

    Google Scholar 

  9. Eugen N. Volanschi, Charles Consel, Gilles Muller, and Crispin Cowan. Declarative Specialization of Object-Oriented Programs. In Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA’97), Atlanta, GA, October 1997.

    Google Scholar 

  10. Calton Pu, Tito Autrey, Andrew Black, Charles Consel, Crispin Cowan, Jon Inouye, Lakshmi Kethana, Jonathan Walpole, and Ke Zhang. Optimistic Incremental Specialization: Streamlining a Commercial Operating System. In Symposium on Operating Systems Principles (SOSP), Copper Mountain, Colorado, December 1995.

    Google Scholar 

  11. Crispin Cowan, Dylan McNamee, Andrew Black, Calton Pu, Jonathan Walpole, Charles Krasic, Renaud Marlet, and Qian Zhang. A Toolkit for Specializing Production Operating SystemCode. Technical Report CSE-97-004, Dept. of Computer Science and Engineering, Oregon Graduate Institute,March 1997.

    Google Scholar 

  12. Arash Baratloo, Timothy Tsai, and Navjot Singh, “Transparent Run-Time Defense Against Stack Smashing Attacks”, Proceedings of the USENIX Annual Technical Conference, June 2000.

    Google Scholar 

  13. “Solar Designer”. Non-Executable User Stack. http://www.false.com/security/linux-stack/.

  14. Casper Dik. Non-Executable Stack for Solaris. Posting to comp.security.unix, January 2 1997.

    Google Scholar 

  15. Richard Jones and Paul Kelly. Bounds Checking for C. http://www-ala.doc.ic.ac.uk/ phjk/BoundsChecking.html, July 1995.

  16. Reed Hastings and Bob Joyce. Purify: Fast Detection of Memory Leaks and Access Errors. In Proceedings of the Winter USENIX Conference, 1992. Also available at http://www.rational.com/support/techpapers/fast_detection/.

  17. Drew Dean, Edward W. Felten, and Dan S. Wallach. Java Security: From HotJava to Netscape and Beyond. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 1996. http://www.cs.princeton.edu/sip/pub/secure96.html.

  18. Jim Roskind. Panel: Security of Downloadable Executable Content. NDSS (Network and Distributed System Security), February 1997.

    Google Scholar 

  19. R. Sekar, T. Bowen, M. Segal “On Preventing Intrusions by Process Behavior Monitoring”, USENIX, Proceedings of the Workshop on Intrusion Detection and Network Monitoring, April 9–12, 1999

    Google Scholar 

  20. A. Kosoresow, “Intrusion detection via system call traces”, IEEE Software’ 97.

    Google Scholar 

  21. Rebecca Gurley Bace, “Intrusion Detection”, Macmillan Technical Publishing, 2000

    Google Scholar 

  22. Maccabe, “Computer Systems: Architecture, Organization and Programming”, pp159–171, 1993

    Google Scholar 

  23. Bulba, Kil3r, “Bypassing Stackguard and Stackshield”, Phrack 56th Ed. File 5th of 16, Phrack.org, May. 2000

    Google Scholar 

  24. Linus Torvalds et al. Linux Operating System. http://www.linux.org/.

  25. Nathan P. Smith. Stack Smashing vulnerabilities in the UNIX Operating System. http://millcomm.com/nate/machines/security/stack-smashing/nate-buffer.ps, 1997.

  26. Alexander Snarskii. FreeBSD Stack Integrity Patch. ftp://ftp.lucky.net/pub/unix/local/libc-letter, 1997.

  27. E. Spafford. The Internet Worm Program: Analysis. Computer Communication Review, January 1989.

    Google Scholar 

  28. Richard M. Stallman. Using and Porting GNU C. Free Software Foundation, Inc., Cambridge, MA.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang-Seo, C., Dong-il, S., Sung-Won, S. (2002). A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. In: Kim, K. (eds) Information Security and Cryptology — ICISC 2001. ICISC 2001. Lecture Notes in Computer Science, vol 2288. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45861-1_12

Download citation

  • DOI: https://doi.org/10.1007/3-540-45861-1_12

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43319-4

  • Online ISBN: 978-3-540-45861-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics