Buffer Overflow Defenses. ©2002, Jedidiah R. Crandall, Susan L. Gerhart, Jan G. Hogle. http://sfsecurity.pr.erau.edu.
Find-and-patch Methods–
Programs that block known attacks
•Example: An anti-virus program that checks files and other inputs to the system for signatures of known attacks
•Pros:
–Very effective against specific attacks that are known
•Cons:
–Not effective against unknown attacks or attacks for which the anti-virus program does not yet have the signature
–The program must keep a current list of signatures for known attacks and must be updated regularly