Hijacking &
Defense
Content
Control Hijacking.
• A control-hijacking attack overwrites some data structures in a victim program that affect
its control flow, and eventually hijacks the control of the program and possibly the underlying
system. ... It causes some of that data to leak out into other buffers, which can corrupt or
overwrite whatever data they were holding.
low.
More Control
Hijacking attacks
integer overflow.
Integer overflows
An example
Cont…
Format string problem
Vulnerable functions
Platform Defense
Control Hijacking Attacks
Control hijacking
attacks
Preventing hijacking attacks
Preventing hijacking attacks
Cont….
Run-time checking
Run-time checking array bounds
Jones-Kelly approach (1997)
Cont…..
Example of a False Alarm
THANK YOU 

Computer System Security Unit 1 Part 2