Abstract

Buffer overflows are known as the most widely used and the oldest forms of attacks used by attackers to gain access for remote code execution and similar attacks. Being the most common form of attack methodologies, these vulnerabilities are still being exploited in the current scenario. Buffer overflows are the vulnerabilities which are exploited due copying function which aren’t set to be bounded. Buffer overflows being a code or system vulnerability has been dominating the field of network and remote execution vulnerabilities. One of its attacks being the SL-Mail server enables attacker to insert remote code into the application and perform numerous attacks, this scenario of exploitation and step by step execution of buffer overflow, which can be used for further study for developing more secure applications. Eliminating buffer overflow vulnerability effectively, a great number of threats would also be eliminated. These vulnerabilities are generally exploited when a general program is provided with a larger data than it can normally accept. Most common defense mechanisms included writing application code in languages that perform bound check such as pascal or java, thus lacking data manipulation for some applications; hence this mitigation technique was not efficient. Several classification techniques have been introduced. Vulnerabilities resulting from buffer overflows are used as testing techniques that indicates the tracking of memory buffers and perform several checks for determining boundary and further conditions. An efficient detection method for severe vulnerability like buffer overflow needs to be discovered as current techniques are flawed and need a greater classification and a greater study of exploiting as well as identifying exploits has to be conducted. Several defense mechanisms along with a detailed study of exploitation of buffer overflow are discussed in this paper. This paper concentrates on these respective exploitation techniques and detection and prevention mechanisms. A quantitative comparison between analysis techniques of buffer overflow detection and analysis of different forms of exploitation methods have been compared for effectiveness for exploiting every aspect of buffer overflow in the source code as well as prevention technique effectiveness has been studied.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call