Method of preventing buffer overflow attacks by intercepting DLL functions

Yu An Tan*, Yuan Da Cao

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

The way of intercepting Windows DLL functions against buffer overflow attacks is evaluated. It's produced at the expense of hooking vulnerable DLL functions by addition of check code. If the return address in the stack belongs to a heap or stack page, the call is from illicit code and the program is terminated. The signature of malicious code is recorded, so it is possible for the next attack to be filtered out. The return-into-libc attacks are detected by comparing the entry address of DLL functions with the overwritten return address in the stack. The presented method interrupts the execution of malicious code and prevents the system from being hijacked when these intercepted DLL functions are invoked in the context of buffer overflow.

Original languageEnglish
Pages (from-to)255-259
Number of pages5
JournalJournal of Beijing Institute of Technology (English Edition)
Volume14
Issue number3
Publication statusPublished - Sept 2005

Keywords

  • Buffer overflow
  • Network security
  • Vulnerability defenses

Fingerprint

Dive into the research topics of 'Method of preventing buffer overflow attacks by intercepting DLL functions'. Together they form a unique fingerprint.

Cite this