Attack code return address Local variables buffer FFFF 0000 Stack Growth String Growth
@inproceedings{Cowan1999AttackCR, title={Attack code return address Local variables buffer FFFF 0000 Stack Growth String Growth}, author={C. Cowan and S. Beattie and R. Day and C. Pu and P. Wagle and E. Walthinsen}, year={1999} }
The StackGuard compiler provides robust automatic protection against the all-too-common problem of stack smashing vulnerabili-ties. However, this protection is only provided for programs and libraries that are re-compiled with StackGuard. Thus protecting an entire system requires that all potentially vulnerable programs be re-compiled to assure that an attacker cannot exploit a stack smashing vulnerability to gain privilege on the system. This paper describes securing a Linux distribution… CONTINUE READING
References
SHOWING 1-9 OF 9 REFERENCES
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
- Computer Science
- USENIX Security Symposium
- 1998
- 1,472
- PDF
Java security: from HotJava to Netscape and beyond
- Computer Science
- Proceedings 1996 IEEE Symposium on Security and Privacy
- 1996
- 338
- PDF
An automated approach for identifying potential vulnerabilities in software
- Computer Science
- Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186)
- 1998
- 102
- PDF
Curmudgeon ’ s Executive Summary
- 1997
Panel : Security of Downloadable Executable Content
- Smashing The Stack For Fun And Profit
- 1997
Nasty security hole in lprm
StackGuard 1 . 1 : Stack Smashing Protection for Shared Libraries