Presentation 2005-07-21
A Note of Intrusion Detection using Alteration of Data
Fumiaki NAGANO, Kohei TATARA, Toshihiro TABATA, Kouichi SAKURAI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) These days, Attacks which alter data in memory illegally are one of the most serious security threats. Although a lot of detection systems have been proposed so far, most of the systems have the problem that only a part of the alteration of data in memory can be detected. And, some detection systems use secret data. But, if an execution code has a bug like format string bug which enable attackers to read data in memory, data in memory might be altered illegally because the secrete data might be guessed by the attackers. Then, we propose a system which detects the alteration of arbitrary data in memory by attackers. Moreover, this system doesn't have the vulnerability that exist the systems which use secret data.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Intrusion Detection / Alteration of Data / Buffer Overflow / Format String Bug
Paper # ISEC2005-14,SITE2005-12
Date of Issue

Conference Information
Committee SITE
Conference Date 2005/7/14(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Social Implications of Technology and Information Ethics (SITE)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Note of Intrusion Detection using Alteration of Data
Sub Title (in English)
Keyword(1) Intrusion Detection
Keyword(2) Alteration of Data
Keyword(3) Buffer Overflow
Keyword(4) Format String Bug
1st Author's Name Fumiaki NAGANO
1st Author's Affiliation Graduate School of Information Science and Electrical Engineering, Kyushu University()
2nd Author's Name Kohei TATARA
2nd Author's Affiliation Graduate School of Information Science and Electrical Engineering, Kyushu University
3rd Author's Name Toshihiro TABATA
3rd Author's Affiliation Graduate School of Natural Science and Technology, Okayama University
4th Author's Name Kouichi SAKURAI
4th Author's Affiliation Faculty of Information Science and Electrical Engineering, Kyushu University
Date 2005-07-21
Paper # ISEC2005-14,SITE2005-12
Volume (vol) vol.105
Number (no) 192
Page pp.pp.-
#Pages 8
Date of Issue