SciELO - Scientific Electronic Library Online

 
vol.10 issue19Fuzzy Logic Tool for Defining an Individual's Personality TraitsHopf Bifurcation Dynamic in a Class of Competence Model Exhibiting Zip Bifurcation author indexsubject indexarticles search
Home Pagealphabetic serial listing  

Services on Demand

Journal

Article

Indicators

Related links

  • On index processCited by Google
  • Have no similar articlesSimilars in SciELO
  • On index processSimilars in Google

Share


Revista Ingenierías Universidad de Medellín

Print version ISSN 1692-3324On-line version ISSN 2248-4094

Abstract

MORA RODRIGUEZ, David  and  MUNOZ, Mario. Memory Corruption Failures Attack and Defense Techniques. Rev. ing. univ. Medellín [online]. 2011, vol.10, n.19, pp.149-158. ISSN 1692-3324.

Attack techniques against memory corruption applications take advantage of the programs weakness for obtaining execution of arbitrary code. These programming failures have been used for several attacks since the 80's. This document shows several techniques to be used by an attacker in order to achieve his objectives and the precautions an application developer should have for preventing the program to be exposed vulnerable situations which may allow having attacks for memory corruption. Manufacturers of operating systems and compilers introduced several defense mechanisms to protect applications. These are not excluding mechanisms and each one of them has its own design objectives for adding new security layers.

Keywords : ASLR; memory corruption; NX/XD; operating systems;; return-oriented programming.

        · abstract in Spanish     · text in Spanish     · Spanish ( pdf )

 

Creative Commons License All the contents of this journal, except where otherwise noted, is licensed under a Creative Commons Attribution License