Cyber Security Expo
 
Guarded Memory Move (GMM) Buffer Overflow Detection And Analysis by Davide Libenzi on 12/02/04

When running a public Internet servers, it is always a good idea to harden your system using tools like stack execution protection, random binaries relocation and so on. Those methods, while giving protection about remote exploits, are very poor when it comes to forensic analysis and debugging of the attack. It is the purpose of this document to introduce a new method called Guarded Memory Move or, more shortly, GMM.

This document is in pdf format. To view it click here.

Rate this article

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , Infosecwriters.com. All rights reserved. Comments are property of the respective posters.