A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation

  • Authors:
  • Yang-Seo Choi;Dong-il Seo;Sung Won Sohn

  • Affiliations:
  • -;-;-

  • Venue:
  • ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

Stack buffer overflow hacking became generally known due to the Morris' Internet Worm in 1988. Since then buffer overflow hacking has been used to attack systems and servers by hackers very frequently. Recently, many researches tried to prevent it, and several solutions were developed such as Libsafe and StackGuard; however, these solutions have a few problems. In this paper we present a new stack buffer overflow attack prevention technique that uses the system call monitoring mechanism and memory address where the system call is made. Because of its detection mechanism this system can be used for unknown attack detection, too.