A Checklist Based Approach For The Mitigation
A Checklist Based Approach For The Mitigation
116
view? evolutionary hackers," Proceedings of the Genetic and
Io.
u Isit
10. considered
Is lt con that
sl (l ere(l tn at all
al l buffer
DU ller overflows
overil ows are security
are aa security C Evolutionary
omputeComputer Computation
Science, Conference, Lecture Notes in
LNCS 3102, pp 263-274, 2004.
risk? [5] Marti R., "THOR: A tool to test intrusion detection systems by
variations of attacks", Master's Thesis, Swiss Federal Institute of
B. Checklistfor Test Engineers Technology, March 2002.
[6] Rubin S., Jha S., Miller B.P., "Automatic Generation and
Analysis ofNIDS Attacks", 20th Annual Computer Security
1. Is there a checking of all string and buffer inputs by Applications Conference - ACSAC, pp 28-38, 2004.
entering a very long string or too much data? [7] Tan, K.M.C., Killourhy, K.S., Maxion, R.A., "Undermining an
2. Is there any checking for one number in the partition? Anomaly-based Intrusion Detection System using Common
3. there
3. Is there any checking for each partition anychckingforechpatitioofvlueExploits",
of value
Is
or size
5th International Symposium on Recent Advances in
Intrusion Detection - RAID, Lecture Notes in Computer Science,
on any input? LNCS 2516, pp 54-73, 2002.
4. Is there any provision for testing of old code when [8] Vigna, G., Robertson, W., Balzarotti D., "Testing Network Based
it for new things, even if it is Intrusion Detection Signatures Using Mutant Exploits", ACM
programmers are using Conference on Computer Security, 2004.
tested before? [9] Wagner, D., Soto, P., "Mimicry Attacks on Host-based Intrusion
5. Is the code tested on all platforms it was meant to run Detection Systems", ACM Conference on Computer Security, pp
on? 255-264, 2002.
6. Are all the assumptions
.
.
taken with attacker's point of
.
htpdgeh.ow/avisriesBuferOvhtml,w99
~~~~~~~~[10]
"Mudge". How to Write Buffer Overflows.
~~~~~~~~~~~~~~~~~~~~~http
://10pht. com/advisories/bufero.html, 1997
view? [I 1] "Aleph One". Smashing The Stack For Fun And Profit. Phrack,
7. Is it considered that all buffer overflows are a security 7(49), November 1996.
risk? [12] Nathan P. Smith. Stack Smashing vulnerabilities in the UNIX
Operating System. http://millcomm.comFnate/
machines/security/stack-smashing/ nate-buffer.ps, 1997.
IV. RESULTS AFTER USING THE CHECKLISTS [13] Barton P. Miller, David Koski, Cjin Pheow Lee, Vivekananda
Maganty, Ravi Murthy, Ajitkumar Natarajan, and Jeff Steidl.
These checklists were tested in a development project of Fuzz Revisited: A reexamination ofthe Reliabilityof
UNIX Utilities and Services. Report, University of Wisconsin,
an organization and results given by them show that risk of 1995.
such attacks is reduced up to 80%. On the request of the [14] B.P. Miller, L. Fredrikson, and B. So. An Empirical Study of
organization, we are not disclosing the name and details of the Reliability of UNIX Utilities. Communications of the
the project. ACM, 33(12):33-44, December 1990.
[15] Michele Crabb. Curmudgeon's Executive Summary. In Michele
Crabb, editor, The SANS Network Security Digest. SANS,
V. CONCLUSION & FUTURE WORK 1997. Contributing Editors: Matt Bishop, Gene Spafford, Steve
Bellovin, Gene Schultz, Rob Kolstad, Marcus Ranum, Dorothy
A checklist based solution is proposed for prevention and Denning, Dan Geer, Peter Neumann, Peter Galvin, David
detection of buffer overflow attacks. If programmers and Harley, Jean Chouanard.
[16] S. K.Pandey, S. I. Ahson: "A Taxonomy of Software
prevtentiogmas beepdnesatthe timeofcoding
mmantnesting
test engineers keep these points in mind, then the
prevention may be done at the time of coding and testing
Security Vulnerabilities", Proceedings of the National
Conference on Security Issues in e-commerce, Aligarh, India,
phase respectively. In future, we are planning to make a Mar 10, 2007.
security assessment framework in which we will use these
checklist based mitigation mechanisms of defects. This
work will help to software programmers and security
experts for building secure software which is the main
objective of this project.
ACKNOWLEDGEMENT
The research work is funded by DIT, Ministry of
Communications and Information Technology, Govt. of
India, under grant no. 12(51)/05-ESD.
REFERENCES
[1] Foster J.C., Osipov V., Bhalla N., Heinen N., "Buffer Overflow
Attacks: Detect, Exploit, Prevent", Syngress Publishing, ISBN
1-932266-67-4, Ch.5, 2005.
[2] Christodorescu M., Jha S., "Static analysis of executables to
detect malicious patterns", Proceedings ofthe USENIX Security
Symposium, 2003.
[3] Detristan T., Ulenspiegel T., Malcom Y., Underduk M. S.,
"Polymorphic shellcode engine using spectrum analysis",
Phrack Online Magazine, 61, 2003.
[4] Dozier, G., Brown, D., Cain, K., Hurley, J., "Vulnerability
analysis of immunity-based intrusion detection systems using
117