메뉴 건너뛰기




Volumn , Issue , 2005, Pages 3-20

A methodology for designing countermeasures against current and future code injection attacks

Author keywords

Advanced exploitation techniques; Buffer overflows; C; C++; Code injection; Countermeasures

Indexed keywords

CODES (SYMBOLS); COMPUTER SOFTWARE; NETWORK SECURITY;

EID: 84908340657     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (52)
  • 2
    • 84860095094 scopus 로고    scopus 로고
    • Once upon a free()
    • anonymous
    • anonymous. Once upon a free(). Phrack, 57, 2001.
    • (2001) Phrack , vol.57
  • 4
    • 85084160891 scopus 로고    scopus 로고
    • Transparent run-time defense against stack smashing attacks
    • San Diego, California, U.S.A., June USENIX Association
    • A. Baratloo, N. Singh, and T. Tsai. Transparent run-time defense against stack smashing attacks. In USENIX 2000 Annual Technical Conference Proceedings, pages 251-262, San Diego, California, U.S.A., June 2000. USENIX Association.
    • (2000) USENIX 2000 Annual Technical Conference Proceedings , pp. 251-262
    • Baratloo, A.1    Singh, N.2    Tsai, T.3
  • 6
    • 85117731645 scopus 로고    scopus 로고
    • May
    • BBP. BSD heap smashing. http://www.security-protocols.com/modules.php? name=News&file=article&si%d=1586, May 2003.
    • (2003) BSD Heap Smashing
  • 7
    • 26844531642 scopus 로고    scopus 로고
    • Basic integer overflows
    • blexim. Dec
    • blexim. Basic integer overflows. Phrack, 60, Dec. 2002.
    • (2002) Phrack , vol.60
  • 9
    • 38049018397 scopus 로고    scopus 로고
    • Feb
    • B. Bray. Compiler security checks in depth. http://msdn.microsoft.com/library/en-us/dv\_vstechart/html/vctchCompile% rSecurityChecksInDepth.asp, Feb. 2002.
    • (2002) Compiler Security Checks in Depth
    • Bray, B.1
  • 10
    • 17644393012 scopus 로고    scopus 로고
    • Bypassing stackguard and stackshield
    • Kil3r
    • Bulba and Kil3r. Bypassing Stackguard and stackshield. Phrack, 56, 2000.
    • (2000) Phrack , vol.56
    • Bulba1
  • 12
    • 85009448253 scopus 로고    scopus 로고
    • Pointguard: Protecting pointers from buffer overflow vulnerabilities
    • Washington, District of Columbia, U.S.A., Aug. USENIX Association
    • C. Cowan, S. Beattie, J. Johansen, and P. Wagle. PointGuard: protecting pointers from buffer overflow vulnerabilities. In Proceedings of the 12th USENIX Security Symposium, pages 91-104, Washington, District of Columbia, U.S.A., Aug. 2003. USENIX Association.
    • (2003) Proceedings of the 12th USENIX Security Symposium , pp. 91-104
    • Cowan, C.1    Beattie, S.2    Johansen, J.3    Wagle, P.4
  • 15
    • 14944385012 scopus 로고    scopus 로고
    • Protecting from stack-smashing attacks
    • IBM Research Divison, Tokyo Research Laboratory, June
    • H. Etoh and K. Yoda. Protecting from stack-smashing attacks. Technical report, IBM Research Divison, Tokyo Research Laboratory, June 2000.
    • (2000) Technical Report
    • Etoh, H.1    Yoda, K.2
  • 16
    • 85084163372 scopus 로고    scopus 로고
    • Stackghost: Hardware facilitated stack protection
    • Washington, District of Columbia, U.S.A., Aug. USENIX Association
    • M. Frantzen and M. Shuey. StackGhost: Hardware facilitated stack protection. In Proceedings of the 10th USENIX Security Symposium, pages 55-66, Washington, District of Columbia, U.S.A., Aug. 2001. USENIX Association.
    • (2001) Proceedings of the 10th USENIX Security Symposium , pp. 55-66
    • Frantzen, M.1    Shuey, M.2
  • 21
    • 0004301215 scopus 로고    scopus 로고
    • JTC 1/SC 22/WG 14. ISO/IEC 9899:1999: Technical report, International Organization for Standards
    • JTC 1/SC 22/WG 14. ISO/IEC 9899:1999: Programming languages - C. Technical report, International Organization for Standards, 1999.
    • (1999) Programming Languages - C
  • 22
    • 84874468457 scopus 로고    scopus 로고
    • Vudo - An object superstitiously believed to embody magical powers
    • M. Kaempf. Vudo - an object superstitiously believed to embody magical powers. Phrack, 57, 2001.
    • (2001) Phrack , vol.57
    • Kaempf, M.1
  • 23
    • 3042716872 scopus 로고
    • Technical Report ESD-TR-74-193, HQ Electronic Systems Division, Hanscom Air Force Base, Massachusetts, U.S.A., June
    • P. A. Karger and R. R. Schell. Multics security evaluation: Vulnerability analysis. Technical Report ESD-TR-74-193, HQ Electronic Systems Division, Hanscom Air Force Base, Massachusetts, U.S.A., June 1974.
    • (1974) Multics Security Evaluation: Vulnerability Analysis
    • Karger, P.A.1    Schell, R.R.2
  • 25
    • 17644371841 scopus 로고
    • BCC: Runtime checking for C programs
    • Toronto, Ontario, Canada, July USENIX Association
    • S. C. Kendall. Bcc: Runtime checking for C programs. In Proceedings of the USENIX Summer 1983 Conference, pages 5-16, Toronto, Ontario, Canada, July 1983. USENIX Association.
    • (1983) Proceedings of the USENIX Summer 1983 Conference , pp. 5-16
    • Kendall, S.C.1
  • 26
    • 3042541202 scopus 로고    scopus 로고
    • The frame pointer overwrite
    • klog
    • klog. The frame pointer overwrite. Phrack, 55, 1999.
    • (1999) Phrack , vol.55
  • 31
    • 85084161451 scopus 로고    scopus 로고
    • Type-assisted dynamic buffer overflow detection
    • San Francisco, California, U.S.A., Aug. USENIX Association
    • K.-S. Lhee and S. J. Chapin. Type-assisted dynamic buffer overflow detection. In Proceedings of the 11th USENIX Security Symposium, pages 81-90, San Francisco, California, U.S.A., Aug. 2002. USENIX Association.
    • (2002) Proceedings of the 11th USENIX Security Symposium , pp. 81-90
    • Lhee, K.-S.1    Chapin, S.J.2
  • 37
    • 0038524496 scopus 로고    scopus 로고
    • Smashing C++ VPtrs
    • rix
    • rix. Smashing C++ VPTRs. Phrack, 56, 2000.
    • (2000) Phrack , vol.56
  • 40
    • 84948970972 scopus 로고
    • Repaired security bugs in multics
    • number MIT/LCS/TM-87, Cambridge, Massachusetts, U.S.A., June Massachusetts Institute of Technology
    • J. H. Saltzer. Repaired security bugs in multics. In Ancillary Reports: Kernel Design Project, number MIT/LCS/TM-87, pages 1-4, Cambridge, Massachusetts, U.S.A., June 1977. Massachusetts Institute of Technology.
    • (1977) Ancillary Reports: Kernel Design Project , pp. 1-4
    • Saltzer, J.H.1
  • 43
    • 85117700430 scopus 로고    scopus 로고
    • Getting around non-executable stack (and fix)
    • mailinglist Aug
    • Solar Designer. Getting around non-executable stack (and fix). Posted on the Bugtraq mailinglist http://www.securityfocus.com/archive/1/7480, Aug. 1997.
    • (1997) Posted on the Bugtraq
  • 45
    • 0026845567 scopus 로고
    • Adding run-time checking to the portable C compiler
    • Apr. ISSN
    • J. L. Steffen. Adding run-time checking to the portable C compiler. Software: Practice and Experience, 22(4):305-316, Apr. 1992. ISSN: 0038-0644.
    • (1992) Software: Practice and Experience , vol.22 , Issue.4 , pp. 305-316
    • Steffen, J.L.1
  • 48
    • 21844444349 scopus 로고    scopus 로고
    • Defeating solar designer non-executable stack patch
    • Jan
    • R. Wojtczuk. Defeating solar designer non-executable stack patch. Posted on the Bugtraq mailinglist http://www.securityfocus.com/archive/1/8470, Jan. 1998.
    • (1998) Posted on the Bugtraq Mailinglist
    • Wojtczuk, R.1
  • 52
    • 38849147719 scopus 로고    scopus 로고
    • Code injection in C and C++: A survey of vulnerabilities and countermeasures
    • Departement Computerwetenschappen, Katholieke Universiteit Leuven, July
    • Y. Younan, W. Joosen, and F. Piessens. Code injection in C and C++: A survey of vulnerabilities and countermeasures. Technical Report CW386, Departement Computerwetenschappen, Katholieke Universiteit Leuven, July 2004.
    • (2004) Technical Report CW386
    • Younan, Y.1    Joosen, W.2    Piessens, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.