Welcome to Journal of Beijing Institute of Technology
Volume 14Issue 3
.
Turn off MathJax
Article Contents
TAN Yu-an, CAO Yuan-da. Method of Preventing Buffer Overflow Attacks by Intercepting DLL Functions[J]. JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2005, 14(3): 255-259.
Citation: TAN Yu-an, CAO Yuan-da. Method of Preventing Buffer Overflow Attacks by Intercepting DLL Functions[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2005, 14(3): 255-259.

Method of Preventing Buffer Overflow Attacks by Intercepting DLL Functions

  • Received Date:2004-01-07
  • The way of intercepting Windows DLL functions against buffer overflow attacks is evaluated. It's produced at the expense of hooking vulnerable DLL functions by addition of check code. If the return address in the stack belongs to a heap or stack page, the call is from illicit code and the program is terminated. The signature of malicious code is recorded, so it is possible for the next attack to be filtered out. The return-into-libc attacks are detected by comparing the entry address of DLL functions with the overwritten return address in the stack. The presented method interrupts the execution of malicious code and prevents the system from being hijacked when these intercepted DLL functions are invoked in the context of buffer overflow.
  • loading
  • [1]
    Chien E,Sz r P.Blended attacks!Ex ploits,vulnerabilities and buffer overflow techniques in computer viruses[Z] .Virus Bulletin Co nference,Louisiana,2002.
    [2]
    L arochelle D,Evans D.Statically detecting likely bufferov erflow vulnerabilities[Z] .T he 2001 U SEN IX SecuritySymposium,Washington D C,2001.
    [3]
    Cowan C,Pu C,Maier D,et al.Stack Guar d:A utomatic adaptive detection and prevention of buffer overflowattacks[Z] .T he 7th U SEN IX Secur ity Conference,SanA ntonio,1998.
    [4]
    O penw all Project.L inux kernel patch from the Openw allproject[EB/OL] .http:ww w.openw all.com/linux/,2003-06-15/2004-03-26.
    [5]
    G oldberg I,Wagner D,T ho mas R,et al.A secure environment for untrusted helper applications[Z] .T heU SENI X 6th UN IX Security Symposium,San Jose,1996.
    [6]
    Ber naschi M,G abrielli E,M ancini V L.Enhancementsto the L inux kernel for blocking buffer overflow based attacks[Z] .T he 4th Annual Linux Show case&Conference,Atlanta,2000.
    [7]
    G alen H,Doug B.Detours:Binar y interception ofWin32 functions[Z] .T he 3rd U SEN IX W indows NTSymposium,Seattle,1999.
    [8]
    L itchfield D.Non stack based exploitation of buffer overrun vulner abilit ies on Window s N T/2000/XP[EB/OL] .http:ww w.nextg enss.com,2002-03-05/2004-03-26.
  • 加载中

Catalog

    通讯作者:陈斌, bchen63@163.com
    • 1.

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (106) PDF downloads(3) Cited by()
    Proportional views
    Related

    /

      Return
      Return
        Baidu
        map