Reference Hub3
Monitoring Buffer Overflow Attacks: A Perennial Task

Monitoring Buffer Overflow Attacks: A Perennial Task

Hossain Shahriar, Mohammad Zulkernine
Copyright: © 2010 |Volume: 1 |Issue: 3 |Pages: 23
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781609608958|DOI: 10.4018/jsse.2010070102
Cite Article Cite Article

MLA

Shahriar, Hossain, and Mohammad Zulkernine. "Monitoring Buffer Overflow Attacks: A Perennial Task." IJSSE vol.1, no.3 2010: pp.18-40. http://doi.org/10.4018/jsse.2010070102

APA

Shahriar, H. & Zulkernine, M. (2010). Monitoring Buffer Overflow Attacks: A Perennial Task. International Journal of Secure Software Engineering (IJSSE), 1(3), 18-40. http://doi.org/10.4018/jsse.2010070102

Chicago

Shahriar, Hossain, and Mohammad Zulkernine. "Monitoring Buffer Overflow Attacks: A Perennial Task," International Journal of Secure Software Engineering (IJSSE) 1, no.3: 18-40. http://doi.org/10.4018/jsse.2010070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Buffer overflow (BOF) is a well-known, and one of the worst and oldest, vulnerabilities in programs. BOF attacks overwrite data buffers and introduce wide ranges of attacks like execution of arbitrary injected code. Many approaches are applied to mitigate buffer overflow vulnerabilities; however, mitigating BOF vulnerabilities is a perennial task as these vulnerabilities elude the mitigation efforts and appear in the operational programs at run-time. Monitoring is a popular approach for detecting BOF attacks during program execution, and it can prevent or send warnings to take actions for avoiding the consequences of the exploitations. Currently, there is no detailed classification of the proposed monitoring approaches to understand their common characteristics, objectives, and limitations. In this paper, the authors classify runtime BOF attack monitoring and prevention approaches based on seven major characteristics. Finally, these approaches are compared for attack detection coverage based on a set of BOF attack types. The classification will enable researchers and practitioners to select an appropriate BOF monitoring approach or provide guidelines to build a new one.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.