A tool for visualizing buffer overflow with detecting return address overwriting

Research output: Contribution to journalConference article

Abstract

Buffer overflow is a serious problem when the software is run as a server on the internet. Especially when the return addresses are overwritten intentionally, the control flow may be changed as the attacker intends. Although there have been proposed several ways to protect attacks that utilize the buffer overflow, the number of the errors owing to the buffer overflow have been increasing gradually. This paper presents a tool that visualizes the buffer overflow when executing programs in C language, especially when the return addresses are overwritten. The functionality is mainly targeted at beginners of C programming who do not recognize the attacks, which we expect makes the number of errors decrease in the future.

Fingerprint

Flow control
Servers
Internet

Keywords

  • Buffer overflow
  • C language
  • Debuggers
  • GUI
  • Integrated development environment
  • Visualization

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Hardware and Architecture
  • Software
  • Neuroscience (miscellaneous)

Cite this

@article{76cd41c25e054d9496140d0ce0abe4b2,
title = "A tool for visualizing buffer overflow with detecting return address overwriting",
abstract = "Buffer overflow is a serious problem when the software is run as a server on the internet. Especially when the return addresses are overwritten intentionally, the control flow may be changed as the attacker intends. Although there have been proposed several ways to protect attacks that utilize the buffer overflow, the number of the errors owing to the buffer overflow have been increasing gradually. This paper presents a tool that visualizes the buffer overflow when executing programs in C language, especially when the return addresses are overwritten. The functionality is mainly targeted at beginners of C programming who do not recognize the attacks, which we expect makes the number of errors decrease in the future.",
keywords = "Buffer overflow, C language, Debuggers, GUI, Integrated development environment, Visualization",
author = "Isao Sasano",
year = "2015",
month = "1",
day = "1",
doi = "10.4108/eai.3-12-2015.2262495",
language = "English",
journal = "EAI International Conference on Bio-inspired Information and Communications Technologies (BICT)",
issn = "2411-6777",

}

TY - JOUR

T1 - A tool for visualizing buffer overflow with detecting return address overwriting

AU - Sasano, Isao

PY - 2015/1/1

Y1 - 2015/1/1

N2 - Buffer overflow is a serious problem when the software is run as a server on the internet. Especially when the return addresses are overwritten intentionally, the control flow may be changed as the attacker intends. Although there have been proposed several ways to protect attacks that utilize the buffer overflow, the number of the errors owing to the buffer overflow have been increasing gradually. This paper presents a tool that visualizes the buffer overflow when executing programs in C language, especially when the return addresses are overwritten. The functionality is mainly targeted at beginners of C programming who do not recognize the attacks, which we expect makes the number of errors decrease in the future.

AB - Buffer overflow is a serious problem when the software is run as a server on the internet. Especially when the return addresses are overwritten intentionally, the control flow may be changed as the attacker intends. Although there have been proposed several ways to protect attacks that utilize the buffer overflow, the number of the errors owing to the buffer overflow have been increasing gradually. This paper presents a tool that visualizes the buffer overflow when executing programs in C language, especially when the return addresses are overwritten. The functionality is mainly targeted at beginners of C programming who do not recognize the attacks, which we expect makes the number of errors decrease in the future.

KW - Buffer overflow

KW - C language

KW - Debuggers

KW - GUI

KW - Integrated development environment

KW - Visualization

UR - http://www.scopus.com/inward/record.url?scp=85052174390&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85052174390&partnerID=8YFLogxK

U2 - 10.4108/eai.3-12-2015.2262495

DO - 10.4108/eai.3-12-2015.2262495

M3 - Conference article

AN - SCOPUS:85052174390

JO - EAI International Conference on Bio-inspired Information and Communications Technologies (BICT)

JF - EAI International Conference on Bio-inspired Information and Communications Technologies (BICT)

SN - 2411-6777

ER -