Oulun yliopisto - Etusivulle University of Oulu in English

ee.oulu.fi

Electrical and Information Engineering

University of Oulu > Faculty of Technology > Electrical and Information Engineering


OUSPG

[This page is CSS2 enabled. Your browser might not fully support it]

Running Malicious Code By Exploiting Buffer Overflows: ...

$RCSfile: index.html,v $ $Revision: 1.3 $ $Date: 2000/08/10 10:45:42 $

ABSTRACT

Buffer overflow vulnerabilities emerge and are announced frequently. Exploitation details and exploits are publicly available for interested parties. These code-based attacks allow malicious code to be executed on the vulnerable systems. This paper provides a brief introduction to buffer overflow vulnerabilities and methods of exploiting them and a review of well-known articles on buffer overflows. A survey is made of exploits that are easily available to everyone, including the underground community. A database of exploits is chosen and studied. Articles on buffer overflows are reviewed, and the exploits presented are examined in terms of functionality. An attempt is made to analyze the distinctive characteristics and operational components of the exploits. Exploitation methods were observed to follow the same guidelines for all platforms. Some figures on exploits are shown. Protection methods and advanced exploitation methods for circumventing them are considered, and issues requiring future research or pertaining to the development of exploits are raised.

Publication details and availability
Title: Running Malicious Code By Exploiting Buffer Overflows: A Survey Of Publicly Available Exploits
Publication details: Takanen, A., Laakso, M., Eronen, J. and Röning, J. (2000) Running Malicious Code By Exploiting Buffer Overflows: A Survey Of Publicly Available Exploits, EICAR 2000 Best Paper Proceedings, pp.158-180.
Availability: [PDF_] Full paper (original)
[PS__] Full paper (original)
[PDF_] Accompanying presentation (original)
[PS__] Accompanying presentation (original) [GZIP]

[This page is CSS2 enabled. Your browser might not fully support it]