期刊文献+

一种新的抵御Windows栈溢出攻击的方法

A New Approach to Defend Against Stack Smashing Attacks for Windows
下载PDF
导出
摘要 当前栈溢出攻击依然是最流行的计算机系统攻击手段之一。文章为Windows操作系统提供了一个工作在装配时刻的防御栈溢出攻击的解决方案,它运用栈溢出攻击检测机制来改写给定的可执行文件,不需要源代码支持。文章建立了一个原型来实现所提出的技术,经过验证,它可以成功的防御现实中使用的攻击代码。接着把该原型扩展到DLL、多线程应用程序和多线程应用程序使用的DLL。测试证明,改写过的可执行文件的运行性能下降不超过8%。 Stack smashing is still one of the most popular techniques for computer system attack. An anti-stack-smashing defense technique for Microsoft Windows systems is presented in this paper. This technique, which consists of instrumenting a given executable with a mechanism to detect stack smashing attacks, works at install-time and does not rely on having access to the source-code. This paper developed a prototype implementing this approach and verified that it successfully defends against actual exploit code, then extended this prototype to vaccinate DLLs, multithreaded applications, and DLLs used by multithreaded applications. Meanwhile, vaccinated executables were no more than 8 percent slower than their unvaccinated originals.
出处 《微电子学与计算机》 CSCD 北大核心 2006年第z1期187-189,共3页 Microelectronics & Computer
基金 国家"863"基金项目(2003AA146010) 河南省科技攻关计划项目(SP200402089)
关键词 计算机安全 缓冲区溢出 栈溢出攻击 二进制改写 Computer security, Buffer overflow, Stack smashing, Instrumentation
  • 相关文献

参考文献6

  • 1[1]CERT/CC Statistics.http://www.cert.org/stats/,1988~2006
  • 2[2]Baratloo A,Singh N,Tsai T.Transparent run-time defense against stack smashing attacks[C].USENIX Annual Technical Conference,2000
  • 3[3]Galen H,Doug B.Detours:Binary interception of Win32Functions[C].3rd USENLX NT Symp.,1999:135~144
  • 4[4]c0v3rt+.Adding sections to PE files:Enhancing functionality of programs by adding extra code[EB/OL].http://www.woodmann.com/fravia/covert1.htm,1999
  • 5[5]Microsoft windows regEdit.exe registry key value buffer overflow vulnerability[EB/OL].Bugtraq id 7411.http://www.securityfocus.com/bid/7411,2003
  • 6[6]Daniel C D,Venkatakrishnan V N,Bhatkar S.SELF:A transparent security extension for ELF binaries[C].Workshop New Security Paradigms,2003:29~38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部