Automatic generation of buffer overflow attack signatures: An approach based on program behavior models

36Citations
Citations of this article
32Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Buffer overflows have become the most common target for network-based attacks. They are also the primary mechanism used by worms and other forms of automated attacks. Although many techniques have been developed to prevent server compromises due to buffer overflows, these defenses still lead to server crashes. When attacks occur repeatedly, as is common with automated attacks, these protection mechanisms lead to repeated restarts of the victim application, rendering its service unavailable. To overcome this problem, we develop a new approach that can learn the characteristics of a particular attack, and filter out future instances of the same attack or its variants. By doing so, our approach significantly increases the availability of servers subjected to repeated attacks. The approach is fully automatic, does not require source code, and has low run-time overheads. In our experiments, it was effective against most attacks, and did not produce any false positives. © 2005 IEEE.

Cite

CITATION STYLE

APA

Liang, Z., & Sekar, R. (2005). Automatic generation of buffer overflow attack signatures: An approach based on program behavior models. In Proceedings - Annual Computer Security Applications Conference, ACSAC (Vol. 2005, pp. 215–224). https://doi.org/10.1109/CSAC.2005.12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free