Integrating offline analysis and online protection to defeat buffer overflow attacks

Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Nowadays Buffer overflow attacks are still recognized as one of the most severe threats in software security. Previous solutions suffer from limitations in that: 1) Some methods based on compiler extensions have limited practicality because they need to access source code; 2) Other methods that need to modify some aspects of the operating system or hardware require much deployment effort; 3) Almost all methods are unable to deploy a runtime protection for programs that cannot afford to restart. In this paper, we propose PHUKO, an on-the-fly buffer overflow prevention system which leverages virtualization technology. PHUKO offers the protected program a fully transparent environment and an easy deployment without the need to restart the program. The experiments show that our system can defend against realistic buffer overflow attacks effectively with moderate performance overhead.

Original languageEnglish (US)
Title of host publicationInformation Security - 13th International Conference, ISC 2010, Revised Selected Papers
Pages409-415
Number of pages7
DOIs
StatePublished - Feb 1 2011
Event13th Information Security Conference, ISC 2010 - Boca Raton, FL, United States
Duration: Oct 25 2010Oct 28 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6531 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other13th Information Security Conference, ISC 2010
CountryUnited States
CityBoca Raton, FL
Period10/25/1010/28/10

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Integrating offline analysis and online protection to defeat buffer overflow attacks'. Together they form a unique fingerprint.

  • Cite this

    Tian, D., Xiong, X., Hu, C., & Liu, P. (2011). Integrating offline analysis and online protection to defeat buffer overflow attacks. In Information Security - 13th International Conference, ISC 2010, Revised Selected Papers (pp. 409-415). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6531 LNCS). https://doi.org/10.1007/978-3-642-18178-8-34