Defence against code injection attacks

Alnabulsi, Hussein, Mamun, Quazi, Islam, Rafiqul and Chowdhury, Morshed U. 2015, Defence against code injection attacks. In Tian, Jing, Jing, Jiwu and Srivatas, Mudhakar (ed), International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014 Beijing, China, September 24-26, 2014, Revised Selected papers, Part II, Springer, Berlin, Germany, pp.237-251, doi: 10.1007/978-3-319-23802-9_19.

Attached Files
Name Description MIMEType Size Downloads

Title Defence against code injection attacks
Author(s) Alnabulsi, Hussein
Mamun, Quazi
Islam, Rafiqul
Chowdhury, Morshed U.ORCID iD for Chowdhury, Morshed U. orcid.org/0000-0002-2866-4955
Title of book International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014 Beijing, China, September 24-26, 2014, Revised Selected papers, Part II
Editor(s) Tian, Jing
Jing, Jiwu
Srivatas, Mudhakar
Publication date 2015
Series Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; v.153
Chapter number 19
Total chapters 32
Start page 237
End page 251
Total pages 15
Publisher Springer
Place of Publication Berlin, Germany
Keyword(s) security
code injection attachs
malicious
Summary Code injection attacks are considered serious threats to the Internet users. In this type of attack the attacker injects malicious codes in the user programs to change or divert the execution flows. In this paper we explore the contemporary defence strategies against code injection attacks (CIAs) and underline their limitations. To overcome these limitations, we suggest a number of countermeasure mechanisms for protecting from CIAs. Our key idea relies on the multiplexing technique to preserve the exact return code to ensure the integrity of program execution trace of shell code. This technique also maintains a FIFO (first in first out) queue to defeat the conflict state when multiple caller method makes a call simultaneously. Finally, our technique can provide better performance, in terms of protection and speed, in some point compared to the CFI (control flow integrity) as well as CPM (code pointer masking) techniques.
ISBN 9783319238029
ISSN 1867-8211
1867-822X
Language eng
DOI 10.1007/978-3-319-23802-9_19
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category B1 Book chapter
ERA Research output type B Book chapter
Copyright notice ©2015, Springer
Persistent URL http://hdl.handle.net/10536/DRO/DU:30082876

Document type: Book Chapter
Collections: School of Information Technology
ERA Postprints
2018 ERA Submission
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 193 Abstract Views, 9 File Downloads  -  Detailed Statistics
Created: Fri, 15 Apr 2016, 16:32:10 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.