Run-time Detection of Heap-based Overflows. Robertson, W., Kruegel, C., Mutz, D., & Valeur, F. In Proc. of the 17th USENIX Systems Admin. Conf., pages 51--60, 2003.
Run-time Detection of Heap-based Overflows [link]Paper  abstract   bibtex   
Buffer overflows belong to the most common class of attacks on today's Internet. Although stack-based variants are still by far more frequent and well-understood, heap-based overflows have recently gained more attention. Several real-world exploits have been published that corrupt heap management information and allow arbitrary code execution with the privileges of the victim process.This paper presents a technique that protects the heap management information and allows for run-time detection of heap-based overflows. We discuss the structure of these attacks and our proposed detection scheme that has been implemented as a patch to the GNU Lib C. We report the results of our experiments, which demonstrate the detection effectiveness and performance impact of our approach. In addition, we discuss different mechanisms to deploy the memory protection.
@inproceedings{robertson_run-time_2003,
	title = {Run-time {Detection} of {Heap}-based {Overflows}},
	url = {http://portal.acm.org/citation.cfm?id=1051937.1051947},
	abstract = {Buffer overflows belong to the most common class of attacks on today's Internet. Although stack-based variants are still by far more frequent and well-understood, heap-based overflows have recently gained more attention. Several real-world exploits have been published that corrupt heap management information and allow arbitrary code execution with the privileges of the victim process.This paper presents a technique that protects the heap management information and allows for run-time detection of heap-based overflows. We discuss the structure of these attacks and our proposed detection scheme that has been implemented as a patch to the GNU Lib C. We report the results of our experiments, which demonstrate the detection effectiveness and performance impact of our approach. In addition, we discuss different mechanisms to deploy the memory protection.},
	urldate = {2011-05-03TZ},
	booktitle = {Proc. of the 17th {USENIX} {Systems} {Admin}. {Conf}.},
	author = {Robertson, William and Kruegel, Christopher and Mutz, Darren and Valeur, Fredrik},
	year = {2003},
	keywords = {buffer overflows, buffering, management, memory management},
	pages = {51--60}
}

Downloads: 0