Skip to Main Content (Press Enter)

Logo UNIMI
  • ×
  • Home
  • Persone
  • Attività
  • Ambiti
  • Strutture
  • Pubblicazioni
  • Terza Missione

Expertise & Skills
Logo UNIMI

|

Expertise & Skills

unimi.it
  • ×
  • Home
  • Persone
  • Attività
  • Ambiti
  • Strutture
  • Pubblicazioni
  • Terza Missione
  1. Pubblicazioni

Memory corruption attacks, defenses, and evasions

Capitolo di libro
Data di Pubblicazione:
2008
Citazione:
Memory corruption attacks, defenses, and evasions / C. Bellettini, J.L. Rrushi - In: Handbook of Research on Information Security and Assurance / [a cura di] J.N.D. Gupta, S. Sharma. - Hershey : Idea Group Reference, 2008 Aug. - ISBN 9781599048550. - pp. 139-151 [10.4018/978-1-59904-855-0.ch012]
Abstract:
The chapter introduces and describes representative defense mechanisms to protect from both basic and advanced exploitation of low-level coding vulnerabilities. Exploitation of low-level coding vulnerabilities has evolved from a basic stack-based buffer overflow with code injection to highly sophisticated attack techniques. In addition, pure-data attacks were demonstrated to be as efficient as control-data attacks and quite realistic. On the other hand research on assessment of the robustness of proposed mitigation techniques revealed various weaknesses in them leading to design and implementation of evasion techniques. Most of the defensive techniques protect only from a limited set of attack techniques, thus a defense employment requires multiple complementary mitigation techniques. Furthermore, there are few mitigation techniques designed to counter pure-data attacks. In response to these limitations, current research proposes better defensive mechanisms such as pointer taintedness detection and attack data burning capable of countering any kind of control-data or pure-data attack.
Tipologia IRIS:
03 - Contributo in volume
Keywords:
security ; memory attacks
Elenco autori:
C. Bellettini, J.L. Rrushi
Autori di Ateneo:
BELLETTINI CARLO NICOLA MARIA ( autore )
Link alla scheda completa:
https://air.unimi.it/handle/2434/169272
Titolo del libro:
Handbook of Research on Information Security and Assurance
  • Aree Di Ricerca

Aree Di Ricerca

Settori


Settore INF/01 - Informatica
  • Informazioni
  • Assistenza
  • Accessibilità
  • Privacy
  • Utilizzo dei cookie
  • Note legali

Realizzato con VIVO | Progettato da Cineca | 26.1.3.0