buffer overflow attack a potential problem and its implications
#1

what is buffer overflow attack, its potential problems, advantages, disadvantages, areas of application
Reply
#2

In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations. This is a special case of the violation of memory safety.Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program operates. This may result in erratic program behavior, including memory access errors, incorrect results, a crash, or a breach of system security. Thus, they are the basis of many software vulnerabilities and can be maliciously exploited.Programming languages commonly associated with buffer overflows include C and C++, which provide no built-in protection against accessing or overwriting data in any part of memory and do not automatically check that data written to an array (the built-in buffer type) is within the boundaries of that array. Bounds checking can prevent buffer overflows.

Have you ever thought of a buffer overflow attack ? It occurs through careless programming and due to patchy nature of the programs. Many C programs have buffer overflow vulnerabilities because the C language lacks array bounds checking, and the culture of C programmers encourages a performance-oriented style that avoids error checking where possible. Eg: gets and strcpy ( no bounds checking ). This paper presents a systematic solution to the persistent problem of buffer overflow attacks. Buffer overflow attack gained notoriety in 1988 as part of the Morris Worm
incident on the Internet. These problems are probably the result of careless programming, and could be corrected
by elementary testing or code reviews along the way.

THE ATTACK :- A (malicious) user finds the vulnerability in a highly privileged program and someone else implements a patch to that particular attack, on that privileged program. Fixes to buffer overflow attacks attempt to solve the problem at the source (the vulnerable program) instead of at the destination (the stack that is being overflowed).

StackGuard :- It is a simple compiler extension that limits the amount of damage that a buffer overflow attack can inflict on a program. The paper discusses the various intricacies to the problem and the implementation details of the Compiler extension 'Stack Guard '.

Stack Smashing Attack :- Buffer overflow attacks exploit a lack of bounds checking on the size of input being stored in a buffer array. The most common data structure to corrupt in this fashion is the stack, called a ``stack smashing attack'' .

StackGuard For Network Access :- The paper also discusses the impacts on network access to the 'Buffer Overflow Attack'.

StackGuard prevents changes to active return addresses by either :-
1. Detecting the change of the return address before the function returns, or
2. Completely preventing the write to the return address. MemGuard is a tool developed
to help debug optimistic specializations by locating code statements that change quasi-invariant
values.

STACKGUARD OVERHEAD
" Canary StackGuard Overhead
" MemGuard StackGuard Overhead
" StackGuard Macrobenchmarks

The paper presents the issues and their implications on the 'IT APPLICATIONS' and discusses the solutions through implementation details of 'Stack Guard'.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: documentation for buffer overflow attack a potential problem and its implimentation, buffer overflow attack a potential problem and its implications, potential problem with supplicantpotential problem analysis, y2k38 problem and its technical soloution, seminar report on bounded buffer problem, buffer overflow attacka potential problem and its implimentation, attacka,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Thumbs Up online catering management system on php with report and source code and ppt 4 8,805 29-04-2017, 10:59 AM
Last Post: jaseela123d
  tcl script for blackhole attack graph 1 699 20-07-2016, 02:20 PM
Last Post: anasek
  how to hack mtn network and free airtime and data 2 1,307 16-07-2016, 04:17 PM
Last Post: jaseela123d
  nptel video steganography attack analysis 1 69 18-06-2016, 11:08 AM
Last Post: dhanabhagya
Wink taylor principles of scientific management and its techniques in big bazar 1 1,324 11-06-2016, 03:02 PM
Last Post: dhanabhagya
  how to hack mtn network and free airtime and data 1 1,068 07-06-2016, 04:05 PM
Last Post: dhanabhagya
  comparison between bluetooth and wifi and gifi 1 834 31-05-2016, 12:31 PM
Last Post: dhanabhagya
  dos attack ppt with sequence diagram 1 612 31-05-2016, 12:09 PM
Last Post: dhanabhagya
  file structures and software testing vivo question and answer 1 802 28-05-2016, 10:25 AM
Last Post: dhanabhagya
Thumbs Up temperature sensor using lm35 and adc 0808 and at89c52 1 926 27-05-2016, 02:12 PM
Last Post: dhanabhagya

Forum Jump: