skip to main content
10.1145/611892.611962acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
Article

Exploring security vulnerabilities by exploiting buffer overflow using the MIPS ISA

Published:11 January 2003Publication History

ABSTRACT

By exploiting a well known security vulnerability in many C library implementations, it is possible for an unprivileged user to gain unrestricted system privileges. With an understanding of how the process execution stack is allocated and managed during process execution, a user can override the return address of a C library routine and thereby resume execution at a different address where a set of malicious functions can be invoked [1]. This is known as the buffer overflow exploit. With buffer overflow as the underlying theme, an example will be described using C and the MIPS assembly language that simultaneously exposes students to issues in computer security, operating systems concepts such as memory management and function invocation/return, and the MIPS instruction set architecture.

References

  1. Aleph One, Smashing the Stack for Fun & Profit, http://www.phrack.com/show.php?p=49&a=14Google ScholarGoogle Scholar
  2. CERT Vulnerability Note CU#259787, http:// www.kb.cert.org/vuls/id/259787.Google ScholarGoogle Scholar
  3. CERT Advisory CA-2002-26 Buffer Overflow in CDE ToolTalk, http://www.cert.org/advisories/CA-2002-26.html.Google ScholarGoogle Scholar
  4. CERT Advisory CA-2002-19 Buffer Overflows in Multiple DNS Resolver http://www.cert.org/ advisories/CA-2002-19.htmlGoogle ScholarGoogle Scholar
  5. Patterson, D., and Hennessey, J., Computer Organization and Design: A Hardware/Software Interface, Appendix A, Morgan Kaufmann (2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Sweetman, D., See MIPS Run, http://www.mkp.com/books_catalog/areas/computer_architecture.asp Morgan Kaufmann, San Francisco, CA, (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Exploring security vulnerabilities by exploiting buffer overflow using the MIPS ISA

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGCSE '03: Proceedings of the 34th SIGCSE technical symposium on Computer science education
      February 2003
      444 pages
      ISBN:158113648X
      DOI:10.1145/611892

      Copyright © 2003 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 January 2003

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate1,595of4,542submissions,35%

      Upcoming Conference

      SIGCSE Virtual 2024

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader