{"title":"设计了实验测试平台,通过仿真来评估软件保护机制对缓冲区溢出攻击的有效性","authors":"V. Srikanth, N. R. Kisore","doi":"10.1109/ICCIC.2015.7435701","DOIUrl":null,"url":null,"abstract":"To date a number of comprehensive techniques have been proposed to defend against buffer overflow attacks. While in theory these techniques aim to detect and defend against all forms of buffer overflows, in practice attackers constantly find techniques to bypass these protection mechanisms. In addition quite many of the mechanisms proposed in literature are never absorbed into a production system as these techniques suffer from performance issues such as high operational overhead in terms of system memory and/or CPU cycles and incompatibility with legacy systems. Further, none of the proposed security mechanisms guarantee 100% assurance against an attacker. On the other hand with the increase in the amount of digital data and the number of devices connected to the internet, the amount of information lost in the event of a large scale cyber attack is ever increasing. While often theoretical study of security is sufficient to identify the weakness of IT systems, an empirical evaluation is necessary to perform cost benefit benefit between the number computer hijacked (is an indirect measure of amount of information lost) in the event of a large scale cyber attack and the buffer overflow protection mechanism adopted. In this paper we propose an architecture for creation of an experimental test bed to evaluate the effectiveness of a buffer overflow protection mechanism by measuring overhead incurred versus it's effectiveness in defending against a large scale cyber attack.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Design of experimental test bed to evaluate effectiveness of software protection mechanisms against buffer overflow attacks through emulation\",\"authors\":\"V. Srikanth, N. R. Kisore\",\"doi\":\"10.1109/ICCIC.2015.7435701\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To date a number of comprehensive techniques have been proposed to defend against buffer overflow attacks. While in theory these techniques aim to detect and defend against all forms of buffer overflows, in practice attackers constantly find techniques to bypass these protection mechanisms. In addition quite many of the mechanisms proposed in literature are never absorbed into a production system as these techniques suffer from performance issues such as high operational overhead in terms of system memory and/or CPU cycles and incompatibility with legacy systems. Further, none of the proposed security mechanisms guarantee 100% assurance against an attacker. On the other hand with the increase in the amount of digital data and the number of devices connected to the internet, the amount of information lost in the event of a large scale cyber attack is ever increasing. While often theoretical study of security is sufficient to identify the weakness of IT systems, an empirical evaluation is necessary to perform cost benefit benefit between the number computer hijacked (is an indirect measure of amount of information lost) in the event of a large scale cyber attack and the buffer overflow protection mechanism adopted. In this paper we propose an architecture for creation of an experimental test bed to evaluate the effectiveness of a buffer overflow protection mechanism by measuring overhead incurred versus it's effectiveness in defending against a large scale cyber attack.\",\"PeriodicalId\":276894,\"journal\":{\"name\":\"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIC.2015.7435701\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIC.2015.7435701","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Design of experimental test bed to evaluate effectiveness of software protection mechanisms against buffer overflow attacks through emulation
To date a number of comprehensive techniques have been proposed to defend against buffer overflow attacks. While in theory these techniques aim to detect and defend against all forms of buffer overflows, in practice attackers constantly find techniques to bypass these protection mechanisms. In addition quite many of the mechanisms proposed in literature are never absorbed into a production system as these techniques suffer from performance issues such as high operational overhead in terms of system memory and/or CPU cycles and incompatibility with legacy systems. Further, none of the proposed security mechanisms guarantee 100% assurance against an attacker. On the other hand with the increase in the amount of digital data and the number of devices connected to the internet, the amount of information lost in the event of a large scale cyber attack is ever increasing. While often theoretical study of security is sufficient to identify the weakness of IT systems, an empirical evaluation is necessary to perform cost benefit benefit between the number computer hijacked (is an indirect measure of amount of information lost) in the event of a large scale cyber attack and the buffer overflow protection mechanism adopted. In this paper we propose an architecture for creation of an experimental test bed to evaluate the effectiveness of a buffer overflow protection mechanism by measuring overhead incurred versus it's effectiveness in defending against a large scale cyber attack.