Back to Search Start Over

Detection and Diagnosis of Control Interception.

Authors :
Hutchison, David
Kanade, Takeo
Kittler, Josef
Kleinberg, Jon M.
Mattern, Friedemann
Mitchell, John C.
Naor, Moni
Nierstrasz, Oscar
Pandu Rangan, C.
Steffen, Bernhard
Sudan, Madhu
Terzopoulos, Demetri
Tygar, Doug
Vardi, Moshe Y.
Weikum, Gerhard
Sihan Qing
Hideki Imai
Guilin Wang
Chang-Hsien Tsai
Shih-Kun Huang
Source :
Information & Communications Security (978-3-540-77047-3); 2008, p412-426, 15p
Publication Year :
2008

Abstract

Crash implies that a software is unstable and possibly vulnerable. Stack overflow is one of many causes of crashes. This kind of bug is often hard to debug because of the corrupted stack, so that debuggers cannot trace the control flow of the programs. A control-type crash caused by stack overflow is easy to be developed as a control interception attack. We develop a method to locate this attack and implement it as a plug-in of Valgrind [1]. This tool can be used in the honeypot to detect and diagnose zero-day exploits. We use it to detect several vulnerabilities and automatically locate the bugs. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540770473
Database :
Complementary Index
Journal :
Information & Communications Security (978-3-540-77047-3)
Publication Type :
Book
Accession number :
34229059
Full Text :
https://doi.org/10.1007/978-3-540-77048-0_32