TY - GEN
T1 - An intrusion detection system using alteration of data
AU - Nagano, Fumiaki
AU - Tatara, Kohei
AU - Tabata, Toshihiro
AU - Sakurai, Kouichi
PY - 2006
Y1 - 2006
N2 - Attacks against data in memory are one of the most serious threats these days. Although many detection systems have been proposed so far, most of them can detect only part of alteration. Some detection systems use canaries to detect alteration. However, if an execution code has bugs that enable attackers to read data in memory, the system could be bypassed by attackers who can guess canaries. To overcome the problems, we propose a system using alteration of data. Our proposed system detects illegal alteration with verifier for vulnerable data. Verifier is made before vulnerable data could be altered by attackers, and verifier is checked when the program uses the vulnerable data. Part of Verifier is stored in kernel area to prevent attackers from reading data in user memory. Our approach can detect illegal alteration of arbitrary data in user memory. Our proposed system, moreover, does not have the problem systems using canaries have.
AB - Attacks against data in memory are one of the most serious threats these days. Although many detection systems have been proposed so far, most of them can detect only part of alteration. Some detection systems use canaries to detect alteration. However, if an execution code has bugs that enable attackers to read data in memory, the system could be bypassed by attackers who can guess canaries. To overcome the problems, we propose a system using alteration of data. Our proposed system detects illegal alteration with verifier for vulnerable data. Verifier is made before vulnerable data could be altered by attackers, and verifier is checked when the program uses the vulnerable data. Part of Verifier is stored in kernel area to prevent attackers from reading data in user memory. Our approach can detect illegal alteration of arbitrary data in user memory. Our proposed system, moreover, does not have the problem systems using canaries have.
UR - http://www.scopus.com/inward/record.url?scp=33751105568&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33751105568&partnerID=8YFLogxK
U2 - 10.1109/AINA.2006.94
DO - 10.1109/AINA.2006.94
M3 - Conference contribution
AN - SCOPUS:33751105568
SN - 0769524664
SN - 9780769524665
T3 - Proceedings - International Conference on Advanced Information Networking and Applications, AINA
SP - 243
EP - 248
BT - Proceedings - 20th International Conference on Advanced Information Networking and Applications
T2 - 20th International Conference on Advanced Information Networking and Applications
Y2 - 18 April 2006 through 20 April 2006
ER -