Paper Abstract and Keywords |
Presentation |
2006-07-20 17:00
Preventing Buffer Overflow Attacks bypassing NXbit Protection Takahiro Shinagawa (TUAT) |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
This paper presents a protection scheme to prevent buffer overflow attacks that bypass the NXbit protection and execute arbitary binary code. In order to prevent unauthorized change of memory protection attributes by chained return-into-libc attacks, we restrict system calls that may drop the NXbit(execute permission) of memory pages. We also restrict system calls that may allow files to be executed or mapped into memory with execute permission to prevent attacks that execute injected binary code by way of files. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Operating Systems / Security / Buffer Overflow Attacks / NXbit / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 106, pp. 215-222, July 2006. |
Paper # |
|
Date of Issue |
2006-07-13 (ISEC, SITE) |
ISSN |
Print edition: ISSN 0913-5685 |
Download PDF |
|
Conference Information |
Committee |
ISEC SITE IPSJ-CSEC |
Conference Date |
2006-07-20 - 2006-07-21 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Okayama Univ. |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
IPSJ-CSEC |
Conference Code |
2006-07-ISEC-SITE-IPSJ-CSEC |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Preventing Buffer Overflow Attacks bypassing NXbit Protection |
Sub Title (in English) |
|
Keyword(1) |
Operating Systems |
Keyword(2) |
Security |
Keyword(3) |
Buffer Overflow Attacks |
Keyword(4) |
NXbit |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Takahiro Shinagawa |
1st Author's Affiliation |
Tokyo University of Agriculture and Technology (TUAT) |
2nd Author's Name |
|
2nd Author's Affiliation |
() |
3rd Author's Name |
|
3rd Author's Affiliation |
() |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2006-07-20 17:00:00 |
Presentation Time |
25 minutes |
Registration for |
IPSJ-CSEC |
Paper # |
ISEC2006-38, SITE2006-35 |
Volume (vol) |
vol.106 |
Number (no) |
no.175(ISEC), no.174(SITE) |
Page |
pp.215-222 |
#Pages |
8 |
Date of Issue |
2006-07-13 (ISEC, SITE) |