Taxonomy of C overflow vulnerabilities attack

Various software vulnerabilities classifications have been constructed since the early 70s for correct understanding of vulnerabilities, and thus acts as a strong foundation to protect and prevent software from exploitation. However, despite all research efforts, exploitable vulnerabilities still ex...

Full description

Bibliographic Details
Published in:Communications in Computer and Information Science
Main Author: Ahmad N.H.; Aljunid S.A.; Ab Manan J.-L.
Format: Conference paper
Language:English
Published: 2011
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-79960358896&doi=10.1007%2f978-3-642-22191-0_33&partnerID=40&md5=1298564cc2374e8fc9d612bb3670a55b
id 2-s2.0-79960358896
spelling 2-s2.0-79960358896
Ahmad N.H.; Aljunid S.A.; Ab Manan J.-L.
Taxonomy of C overflow vulnerabilities attack
2011
Communications in Computer and Information Science
180 CCIS
PART 2
10.1007/978-3-642-22191-0_33
https://www.scopus.com/inward/record.uri?eid=2-s2.0-79960358896&doi=10.1007%2f978-3-642-22191-0_33&partnerID=40&md5=1298564cc2374e8fc9d612bb3670a55b
Various software vulnerabilities classifications have been constructed since the early 70s for correct understanding of vulnerabilities, and thus acts as a strong foundation to protect and prevent software from exploitation. However, despite all research efforts, exploitable vulnerabilities still exist in most major software, the most common still being C overflows vulnerabilities. C overflow vulnerabilities are the most frequent vulnerabilities to appear in various advisories with high impact or critical severity. Partially but significantly, this is due to the absence of a source code perspective taxonomy to address all types of C overflow vulnerabilities. Therefore, we propose this taxonomy, which also classifies the latest C overflow vulnerabilities into four new categories. We also describe ways to detect and overcome these vulnerabilities, and hence, acts as a valuable reference for developers and security analysts to identify potential security C loopholes so as to reduce or prevent exploitations altogether. © 2011 Springer-Verlag.

18650929
English
Conference paper

author Ahmad N.H.; Aljunid S.A.; Ab Manan J.-L.
spellingShingle Ahmad N.H.; Aljunid S.A.; Ab Manan J.-L.
Taxonomy of C overflow vulnerabilities attack
author_facet Ahmad N.H.; Aljunid S.A.; Ab Manan J.-L.
author_sort Ahmad N.H.; Aljunid S.A.; Ab Manan J.-L.
title Taxonomy of C overflow vulnerabilities attack
title_short Taxonomy of C overflow vulnerabilities attack
title_full Taxonomy of C overflow vulnerabilities attack
title_fullStr Taxonomy of C overflow vulnerabilities attack
title_full_unstemmed Taxonomy of C overflow vulnerabilities attack
title_sort Taxonomy of C overflow vulnerabilities attack
publishDate 2011
container_title Communications in Computer and Information Science
container_volume 180 CCIS
container_issue PART 2
doi_str_mv 10.1007/978-3-642-22191-0_33
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-79960358896&doi=10.1007%2f978-3-642-22191-0_33&partnerID=40&md5=1298564cc2374e8fc9d612bb3670a55b
description Various software vulnerabilities classifications have been constructed since the early 70s for correct understanding of vulnerabilities, and thus acts as a strong foundation to protect and prevent software from exploitation. However, despite all research efforts, exploitable vulnerabilities still exist in most major software, the most common still being C overflows vulnerabilities. C overflow vulnerabilities are the most frequent vulnerabilities to appear in various advisories with high impact or critical severity. Partially but significantly, this is due to the absence of a source code perspective taxonomy to address all types of C overflow vulnerabilities. Therefore, we propose this taxonomy, which also classifies the latest C overflow vulnerabilities into four new categories. We also describe ways to detect and overcome these vulnerabilities, and hence, acts as a valuable reference for developers and security analysts to identify potential security C loopholes so as to reduce or prevent exploitations altogether. © 2011 Springer-Verlag.
publisher
issn 18650929
language English
format Conference paper
accesstype
record_format scopus
collection Scopus
_version_ 1814778510565179392