Corpus ID: 17301620

Attack code return address Local variables buffer FFFF 0000 Stack Growth String Growth

@inproceedings{Cowan1999AttackCR,
  title={Attack code return address Local variables buffer FFFF 0000 Stack Growth String Growth},
  author={C. Cowan and S. Beattie and R. Day and C. Pu and P. Wagle and E. Walthinsen},
  year={1999}
}
  • C. Cowan, S. Beattie, +3 authors E. Walthinsen
  • Published 1999
  • The StackGuard compiler provides robust automatic protection against the all-too-common problem of stack smashing vulnerabili-ties. However, this protection is only provided for programs and libraries that are re-compiled with StackGuard. Thus protecting an entire system requires that all potentially vulnerable programs be re-compiled to assure that an attacker cannot exploit a stack smashing vulnerability to gain privilege on the system. This paper describes securing a Linux distribution… CONTINUE READING

    Figures and Tables from this paper

    References

    SHOWING 1-9 OF 9 REFERENCES
    StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
    • 1,472
    • PDF
    Fast detection of memory leaks and access errors
    • 546
    • PDF
    Java security: from HotJava to Netscape and beyond
    • 338
    • PDF
    An automated approach for identifying potential vulnerabilities in software
    • 102
    • PDF
    Death, taxes, and imperfect software: surviving the inevitable
    • 36
    • PDF
    Curmudgeon ’ s Executive Summary
    • 1997
    Panel : Security of Downloadable Executable Content
    • Smashing The Stack For Fun And Profit
    • 1997
    Nasty security hole in lprm
      StackGuard 1 . 1 : Stack Smashing Protection for Shared Libraries