An intrusion detection system using alteration of data

  title={An intrusion detection system using alteration of data},
  author={Fumiaki Nagano and Kohei Tatara and Kouichi Sakurai and Toshihiro Tabata},
  journal={20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)},
  pages={6 pp.-248}
Attacks against data in memory are one of the most serious threats these days. Although many detection systems have been proposed so far, most of them can detect only part of alteration. Some detection systems use canaries to detect alteration. However, if an execution code has bugs that enable attackers to read data in memory, the system could be bypassed by attackers who can guess canaries. To overcome the problems, we propose a system using alteration of data. Our proposed system detects… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-3 of 3 extracted citations

Mutation-Based Testing of Format String Bugs

2008 11th IEEE High Assurance Systems Engineering Symposium • 2008
View 3 Excerpts
Highly Influenced


Publications referenced by this paper.
Showing 1-10 of 11 references

Exploiting Soft- Ware How to Break Code

Greg Hoglund, Gary McGraw
nikkeiBP, • 2004
View 1 Excerpt

On the Effectiveness of Address- Space Randomization

H. Shacham, M. Page, +3 authors D. Boneh
In the 11th ACM Conference on Computer and Communications Security(CCS), • 2004
View 1 Excerpt

Protecting memories in multitask OSes -tampering detection

In IEICE Technical Report Vol.104,No.200, • 2004
View 1 Excerpt

Address obfuscation: an efficient approach to combat a broad range of memory error exploits

Sandeep Bhatkar, Daniel C. DuVarney, R. Sekar
In the 12th USENIX Security Symposium, • 2003

Transparent Run-Time Defense Against Stack-Smashing Attacks

USENIX Annual Technical Conference, General Track • 2000
View 1 Excerpt

propolice:improved stack-smashing attack detection

Hiroaki Etoh, Kunikazu Yoda
In IPSJ SIGNotes Computer Security, • 2000
View 1 Excerpt

Similar Papers

Loading similar papers…