2010 Fourth International Conference on Digital Society 2010
DOI: 10.1109/icds.2010.37
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Modifying the program during execution [2] is another class of attacks that we target. Specific instances of this class include buffer-overflow attack [17] and return-to-libc attack [18].…”
Section: The Threat Modelmentioning
confidence: 99%
“…Modifying the program during execution [2] is another class of attacks that we target. Specific instances of this class include buffer-overflow attack [17] and return-to-libc attack [18].…”
Section: The Threat Modelmentioning
confidence: 99%
“…The return address attack targets return to libc, in which an adversary injects a malicious code that executes a hidden function in the background, which can go undetected by the system [40]. This attack does not need an executable stack or a shellcode but instead causes the main code to jump to the malicious program.…”
Section: Return Address Attacksmentioning
confidence: 99%