About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II

Research Article

Defence Against Code Injection Attacks

Download(Requires a free EAI acccount)
329 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-23802-9_19,
        author={Hussein Alnabulsi and Quazi Mamun and Rafiqul Islam and Morshed Chowdhury},
        title={Defence Against Code Injection Attacks},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II},
        proceedings_a={SECURECOMM},
        year={2015},
        month={12},
        keywords={Security Code injection attacks Malicious},
        doi={10.1007/978-3-319-23802-9_19}
    }
    
  • Hussein Alnabulsi
    Quazi Mamun
    Rafiqul Islam
    Morshed Chowdhury
    Year: 2015
    Defence Against Code Injection Attacks
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23802-9_19
Hussein Alnabulsi1,*, Quazi Mamun1,*, Rafiqul Islam1,*, Morshed Chowdhury2,*
  • 1: Charles Sturt University
  • 2: Deakin University
*Contact email: halnabulsi@csu.edu.au, qmamun@csu.edu.au, mislam@csu.edu.au, muc@deakin.edu.au

Abstract

Code injection attacks are considered serious threats to the Internet users. In this type of attack the attacker injects malicious codes in the user programs to change or divert the execution flows. In this paper we explore the contemporary defence strategies against code injection attacks (CIAs) and underline their limitations. To overcome these limitations, we suggest a number of countermeasure mechanisms for protecting from CIAs. Our key idea relies on the multiplexing technique to preserve the exact return code to ensure the integrity of program execution trace of shell code. This technique also maintains a FIFO (first in first out) queue to defeat the conflict state when multiple caller method makes a call simultaneously. Finally, our technique can provide better performance, in terms of protection and speed, in some point compared to the CFI (control flow integrity) as well as CPM (code pointer masking) techniques.

Keywords
Security Code injection attacks Malicious
Published
2015-12-03
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-23802-9_19
Copyright © 2014–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL