Monitoring Buffer Overflow Attacks

2010 ◽  
Vol 1 (3) ◽  
pp. 18-40 ◽  
Author(s):  
Hossain Shahriar ◽  
Mohammad Zulkernine

Buffer overflow (BOF) is a well-known, and one of the worst and oldest, vulnerabilities in programs. BOF attacks overwrite data buffers and introduce wide ranges of attacks like execution of arbitrary injected code. Many approaches are applied to mitigate buffer overflow vulnerabilities; however, mitigating BOF vulnerabilities is a perennial task as these vulnerabilities elude the mitigation efforts and appear in the operational programs at run-time. Monitoring is a popular approach for detecting BOF attacks during program execution, and it can prevent or send warnings to take actions for avoiding the consequences of the exploitations. Currently, there is no detailed classification of the proposed monitoring approaches to understand their common characteristics, objectives, and limitations. In this paper, the authors classify runtime BOF attack monitoring and prevention approaches based on seven major characteristics. Finally, these approaches are compared for attack detection coverage based on a set of BOF attack types. The classification will enable researchers and practitioners to select an appropriate BOF monitoring approach or provide guidelines to build a new one.

Author(s):  
Hossain Shahriar ◽  
Mohammad Zulkernine

Buffer overflow (BOF) is a well-known, and one of the worst and oldest, vulnerabilities in programs. BOF attacks overwrite data buffers and introduce wide ranges of attacks like execution of arbitrary injected code. Many approaches are applied to mitigate buffer overflow vulnerabilities; however, mitigating BOF vulnerabilities is a perennial task as these vulnerabilities elude the mitigation efforts and appear in the operational programs at run-time. Monitoring is a popular approach for detecting BOF attacks during program execution, and it can prevent or send warnings to take actions for avoiding the consequences of the exploitations. Currently, there is no detailed classification of the proposed monitoring approaches to understand their common characteristics, objectives, and limitations. In this paper, the authors classify runtime BOF attack monitoring and prevention approaches based on seven major characteristics. Finally, these approaches are compared for attack detection coverage based on a set of BOF attack types. The classification will enable researchers and practitioners to select an appropriate BOF monitoring approach or provide guidelines to build a new one.


2001 ◽  
Vol 12 (01) ◽  
pp. 97-124 ◽  
Author(s):  
EDGAR F. A. LEDERER ◽  
ROMEO A. DUMITRESCU

Two-Stage Programming (2SP) is an experimental programming language, the first implementation of the Specification-Consistent Coordination Model (SCCM). The SCCM proposes a new, mixed-paradigm (functional/imperative) approach to developing reliable programs based on complete run-time checking of computations with respect to a given specification. A 2SP program consists of a functional specification and an imperative coordination tightly connected to the specification. The coordination maps the specification to an imperative and possibly parallel/distributed program. Normal termination of a 2SP program execution implies the correctness of the computed results with respect to the specification, for that execution. We present the basic feautures of the SCCM/2SP, a new message-spassing system of 2SP with integrated run-time checking, and a larger case study. We show that 2SP provides: functional specifications, specification-consistent imperative coordinations, automatic run-time result verification and error detection, enhanced debugging support, and good efficiency.


2021 ◽  
Vol 2021 ◽  
pp. 1-21
Author(s):  
George Iakovakis ◽  
Constantinos-Giovanni Xarhoulacos ◽  
Konstantinos Giovas ◽  
Dimitris Gritzalis

The COVID-19 outbreak has forced businesses to shift to an unprecedented “work from home” company environment. While this provides advantages for employees and businesses, it also leads to a multitude of shortcomings, most prevalent of which is the emergence of additional security risks. Previous to the outbreak, company computer networks were mainly confined within its facilities. The pandemic has now caused this network to “spread thin,” as the majority of employees work remotely. This has opened up a variety of new vulnerabilities, as workers’ cyber protection is not the same at home as it is in office. Although the effects of the virus are now subsiding, working remotely has embedded itself as the new normal. Thus, it is imperative for company management to take the necessary steps to ensure business continuity and be prepared to deal with an increased number of cyber threats. In our research, we provide a detailed classification for a group of tools which will facilitate risk mitigation and prevention. We also provide a selection of automated tools such as vulnerability scanners, monitoring and logging tools, and antivirus software. We outline each tool using tables, to show useful information such as advantages, disadvantages, scalability, cost, and other characteristics. Additionally, we implement decision trees for each category of tools, in an attempt to assist in navigating the large amount of information presented in this paper. Our objective is to provide a multifaceted taxonomy and analysis of mitigation tools, which will support companies in their endeavor to protect their computer networks. Our contribution can also help companies to have some type of cyber threat intelligence so as to put themselves one step ahead of cyber criminals.


Author(s):  
I.O. Mikulionok

The basic data on the volume of production of pneumatic tires in the world and in Ukraine are presented. The need to improve the ways of handling pneumatic tires that have lost their con-sumer properties (worn out tires as a result of their intended use and tires rejected as a result of passing quality control during their manufacture) is shown as one of the most dangerous for the environment and promising in terms of using their properties. A detailed classification of methods for handling worn out and defective tires is proposed and a critical analysis of each of them is given. Particular attention is paid to the methods of utilization of tires, in particular, recycling, which makes it possible to efficiently use the secondary raw materials obtained from tires directly for their intended purpose. The features of physical, physicochemical and chemical processing methods, in particular combustion, gasification, pyrolysis of tires and their frag-ments, as well as the prospects for their decomposition under the influence of environmental factors, in particular microorganisms, are also considered. The main ways of solving the prob-lem of tires that have lost their consumer properties in Ukraine are proposed. Bibl. 88, Fig. 2.


2013 ◽  
Vol 5 (2) ◽  
pp. 136-143 ◽  
Author(s):  
Astha Mehra ◽  
Sanjay Kumar Dubey

In today’s world data is produced every day at a phenomenal rate and we are required to store this ever growing data on almost daily basis. Even though our ability to store this huge data has grown but the problem lies when users expect sophisticated information from this data. This can be achieved by uncovering the hidden information from the raw data, which is the purpose of data mining.  Data mining or knowledge discovery is the computer-assisted process of digging through and analyzing enormous set of data and then extracting the meaning out of it. The raw and unlabeled data present in large databases can be classified initially in an unsupervised manner by making use of cluster analysis. Clustering analysis is the process of finding the groups of objects such that the objects in a group will be similar to one another and dissimilar from the objects in other groups. These groups are known as clusters.  In other words, clustering is the process of organizing the data objects in groups whose members have some similarity among them. Some of the applications of clustering are in marketing -finding group of customers with similar behavior, biology- classification of plants and animals given their features, data analysis, and earthquake study -observe earthquake epicenter to identify dangerous zones, WWW -document classification, etc. The results or outcome and efficiency of clustering process is generally identified though various clustering algorithms. The aim of this research paper is to compare two important clustering algorithms namely centroid based K-means and X-means. The performance of the algorithms is evaluated in different program execution on the same input dataset. The performance of these algorithms is analyzed and compared on the basis of quality of clustering outputs, number of iterations and cut-off factors.


2003 ◽  
Vol 15 (3) ◽  
pp. 278-285
Author(s):  
Daigo Misaki ◽  
◽  
Shigeru Aomura ◽  
Noriyuki Aoyama

We discuss effective pattern recognition for contour images by hierarchical feature extraction. When pattern recognition is done for an unlimited object, it is effective to see the object in a perspective manner at the beginning and next to see in detail. General features are used for rough classification and local features are used for a more detailed classification. D-P matching is applied for classification of a typical contour image of individual class, which contains selected points called ""landmark""s, and rough classification is done. Features between these landmarks are analyzed and used as input data of neural networks for more detailed classification. We apply this to an illustrated referenced book of insects in which much information is classified hierarchically to verify the proposed method. By introducing landmarks, a neural network can be used effectively for pattern recognition of contour images.


PEDIATRICS ◽  
1971 ◽  
Vol 47 (6) ◽  
pp. 1103-1104
Author(s):  
David S. Walton

The authors begin their presentation–in this, the first textbook I know of devoted entirely to pediatric glaucomas–with a detailed classification of glaucomas in childhood. This is followed by a discussion of diagnostic techniques and the important clinical signs encountered in the pediatric glaucomas. A description of the conditions assoiated with childhood glaucomas follows, including a concise review of their distinguishing ocular features, with additional comments on treatment. The final section deals with methods of treatment; appropriate emphasis is given to the operative techniques used in performing a goniotomy.


1981 ◽  
Vol 33 (5) ◽  
pp. 1097-1110 ◽  
Author(s):  
A. T. Huckleberry ◽  
E. L. Livorni

Throughout this paper a surface is a 2-dimensional (not necessarily compact) complex manifold. A surface X is homogeneous if a complex Lie group G of holomorphic transformations acts holomorphically and transitively on it. Concisely, X is homogeneous if it can be identified with the left coset space G/H, where if is a closed complex Lie subgroup of G. We emphasize that the assumption that G is a complex Lie group is an essential part of the definition. For example, the 2-dimensional ball B2 is certainly “homogeneous” in the sense that its automorphism group acts transitively. But it is impossible to realize B2 as a homogeneous space in the above sense. The purpose of this paper is to give a detailed classification of the homogeneous surfaces. We give explicit descriptions of all possibilities.


Author(s):  
Nils Braakmann ◽  
Joachim Wagner

SummaryWe use unique rich data for German manufacturing enterprises to investigate the product diversification - firm performance relationship.We find that an increase in the degree of product diversification has a negative impact on profitability when observed and unobserved firm characteristics are controlled for. The effects are statistically significant and large from an economic point of view. This helps to understand the fact that nearly 40 percent of all enterprises with at least 20 employees are single-product firms according to a detailed classification of products, and that multi-product enterprises with a large number of goods are a rare species.


Sign in / Sign up

Export Citation Format

Share Document