Presentation 2006-07-20
Preventing Buffer Overflow Attacks bypassing NXbit Protection
Takahiro SHINAGAWA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) This paper presents a protection scheme to prevent buffer overflow attacks that bypass the NXbit protection and execute arbitary binary code. In order to prevent unauthorized change of memory protection attributes by chained return-into-libc attacks, we restrict system calls that may drop the NXbit(execute permission) of memory pages. We also restrict system calls that may allow files to be executed or mapped into memory with execute permission to prevent attacks that execute injected binary code by way of files.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Operating Systems / Security / Buffer Overflow Attacks / NXbit
Paper # ISEC2006-38,SITE2006-35
Date of Issue

Conference Information
Committee SITE
Conference Date 2006/7/13(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Social Implications of Technology and Information Ethics (SITE)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Preventing Buffer Overflow Attacks bypassing NXbit Protection
Sub Title (in English)
Keyword(1) Operating Systems
Keyword(2) Security
Keyword(3) Buffer Overflow Attacks
Keyword(4) NXbit
1st Author's Name Takahiro SHINAGAWA
1st Author's Affiliation Division of System Information Science, Institute of Symbiotic Science and Technology, Tokyo University of Agriculture and Technology()
Date 2006-07-20
Paper # ISEC2006-38,SITE2006-35
Volume (vol) vol.106
Number (no) 174
Page pp.pp.-
#Pages 8
Date of Issue