An overview of prevention/mitigation against memory corruption attack

Jasim Khalsan Mahmood, Michael Opoku Agyeman

Research output: Contribution to Book/Report typesChapterResearchpeer-review

Abstract

One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Memory corruption. It is a vulnerability where a memory location contents of a computer system are altered because of programming errors allowing execution of arbitrary codes. It particularly happens in low-level programming languages such as C, C++ because of their lack of memory safety. Many defense techniques against this kind of attacks have been presented and implemented to prevent it. However, an advanced version of the attack can bypass some of these techniques and harm the system. In this work, we present an overview of the Memory corruption attacks and the existing mitigation techniques for both compilers and operating systems. We hope that this survey will provide sufficient details that can be useful for researchers and system designer.
Original languageEnglish
Title of host publicationInternational Symposium on Computer Science and Intelligent Control
Place of PublicationSweden
PublisherISCSIC
Publication statusAccepted/In press - 8 May 2018

Fingerprint

Data storage equipment
Computer programming
Computer programming languages
Computer systems

Cite this

Mahmood, J. K., & Opoku Agyeman, M. (Accepted/In press). An overview of prevention/mitigation against memory corruption attack. In International Symposium on Computer Science and Intelligent Control Sweden: ISCSIC.
Mahmood, Jasim Khalsan ; Opoku Agyeman, Michael. / An overview of prevention/mitigation against memory corruption attack. International Symposium on Computer Science and Intelligent Control. Sweden : ISCSIC, 2018.
@inbook{dd5fbdc869ff4e6c800b628e83aefac0,
title = "An overview of prevention/mitigation against memory corruption attack",
abstract = "One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Memory corruption. It is a vulnerability where a memory location contents of a computer system are altered because of programming errors allowing execution of arbitrary codes. It particularly happens in low-level programming languages such as C, C++ because of their lack of memory safety. Many defense techniques against this kind of attacks have been presented and implemented to prevent it. However, an advanced version of the attack can bypass some of these techniques and harm the system. In this work, we present an overview of the Memory corruption attacks and the existing mitigation techniques for both compilers and operating systems. We hope that this survey will provide sufficient details that can be useful for researchers and system designer.",
author = "Mahmood, {Jasim Khalsan} and {Opoku Agyeman}, Michael",
year = "2018",
month = "5",
day = "8",
language = "English",
booktitle = "International Symposium on Computer Science and Intelligent Control",
publisher = "ISCSIC",

}

Mahmood, JK & Opoku Agyeman, M 2018, An overview of prevention/mitigation against memory corruption attack. in International Symposium on Computer Science and Intelligent Control. ISCSIC, Sweden.

An overview of prevention/mitigation against memory corruption attack. / Mahmood, Jasim Khalsan; Opoku Agyeman, Michael.

International Symposium on Computer Science and Intelligent Control. Sweden : ISCSIC, 2018.

Research output: Contribution to Book/Report typesChapterResearchpeer-review

TY - CHAP

T1 - An overview of prevention/mitigation against memory corruption attack

AU - Mahmood, Jasim Khalsan

AU - Opoku Agyeman, Michael

PY - 2018/5/8

Y1 - 2018/5/8

N2 - One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Memory corruption. It is a vulnerability where a memory location contents of a computer system are altered because of programming errors allowing execution of arbitrary codes. It particularly happens in low-level programming languages such as C, C++ because of their lack of memory safety. Many defense techniques against this kind of attacks have been presented and implemented to prevent it. However, an advanced version of the attack can bypass some of these techniques and harm the system. In this work, we present an overview of the Memory corruption attacks and the existing mitigation techniques for both compilers and operating systems. We hope that this survey will provide sufficient details that can be useful for researchers and system designer.

AB - One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Memory corruption. It is a vulnerability where a memory location contents of a computer system are altered because of programming errors allowing execution of arbitrary codes. It particularly happens in low-level programming languages such as C, C++ because of their lack of memory safety. Many defense techniques against this kind of attacks have been presented and implemented to prevent it. However, an advanced version of the attack can bypass some of these techniques and harm the system. In this work, we present an overview of the Memory corruption attacks and the existing mitigation techniques for both compilers and operating systems. We hope that this survey will provide sufficient details that can be useful for researchers and system designer.

M3 - Chapter

BT - International Symposium on Computer Science and Intelligent Control

PB - ISCSIC

CY - Sweden

ER -

Mahmood JK, Opoku Agyeman M. An overview of prevention/mitigation against memory corruption attack. In International Symposium on Computer Science and Intelligent Control. Sweden: ISCSIC. 2018