Deakin University
Browse

Defence against code injection attacks

chapter
posted on 2015-11-19, 00:00 authored by H Alnabulsi, Q Mamun, R Islam, Morshed Chowdhury
Code injection attacks are considered serious threats to the Internet users. In this type of attack the attacker injects malicious codes in the user programs to change or divert the execution flows. In this paper we explore the contemporary defence strategies against code injection attacks (CIAs) and underline their limitations. To overcome these limitations, we suggest a number of countermeasure mechanisms for protecting from CIAs. Our key idea relies on the multiplexing technique to preserve the exact return code to ensure the integrity of program execution trace of shell code. This technique also maintains a FIFO (first in first out) queue to defeat the conflict state when multiple caller method makes a call simultaneously. Finally, our technique can provide better performance, in terms of protection and speed, in some point compared to the CFI (control flow integrity) as well as CPM (code pointer masking) techniques.

History

Volume

153

Chapter number

19

Pagination

237-251

ISSN

1867-8211

eISSN

1867-822X

ISBN-13

9783319238029

Language

eng

Publication classification

B Book chapter, B1 Book chapter

Copyright notice

2015, Springer

Extent

32

Editor/Contributor(s)

Tian J, Jing J, Srivatas M

Publisher

Springer

Place of publication

Berlin, Germany

Title of book

International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014 Beijing, China, September 24-26, 2014, Revised Selected papers, Part II

Series

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; v.153

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC