Tracking and mitigating classic buffer overflow during software design phase using the attack-based security analysis model

Regardless that the classic buffer overflow is a known and simple threat against software systems; security agencies still consider this threat as one of the most common software vulnerabilities. Aiming to increasing security resistance against this software threat, emphasize on software design phas...

Full description

Saved in:
Bibliographic Details
Main Authors: Kama, Mohd. Nazri, Hedayatpour, Saman
Format: Article
Published: Science and Engineering Research Support Society 2014
Subjects:
Online Access:http://eprints.utm.my/id/eprint/63110/
http://dx.doi.org/10.14257/ijseia.2014.8.8,16
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Regardless that the classic buffer overflow is a known and simple threat against software systems; security agencies still consider this threat as one of the most common software vulnerabilities. Aiming to increasing security resistance against this software threat, emphasize on software design phase is highly reasonable where cost and time required for fixing error in design level is several times lesser than coding or implementation levels. In this purpose, we use the Attack-based security analysis model for tracking and mitigating the classic buffer overflow during the software design phase. Through this model, we use known properties and behaviors of the buffer overflow to determine system vulnerabilities and address required security aspects. In this paper, we describe how to apply the Attack-based security analysis model for increasing security resistance against the classic buffer overflow. The main contribution of this work refers to showing capability of the Attack-based security analysis model in tracking and mitigating the classic buffer overflow into the software design phase in such a way that additional cost and time are not required for system analyzing and defining threat scenario.