by Arash Baratloo, Timothy Tsai, and Navjot Singh, libsafe (at) research.bell-labs (dot) com [email concealed]
Platforms: Linux, UNIX
Categories: Libraries, Replacement
Version: v2.0-13
The exploitation of buffer overflow vulnerabilities in process stacks constitutes a significant portion of security attacks in recent years. We present a new method to detect and handle such attacks. In contrast to previous work, our method does not require any modification to the operating system and works with existing binary programs. Our method does not require access to the source code of defective programs, nor does it require recompilation or off-line processing of binaries.

Comments Mode:
Libsafe 2004-02-07
William Kurtz <billy00the00kid (at) yahoo (dot) com [email concealed]>


Privacy Statement
Copyright 2010, SecurityFocus