期刊文献+

使用动态二进制翻译防止代码植入攻击 被引量:1

Dynamic Binary Translation for Preventing Code Injection Attacks
下载PDF
导出
摘要 论文主要介绍了代码植入攻击的原理及其防范 ,并讨论了如何将动态二进制翻译应用于代码植入攻击的防范 ,介绍了两种方法 :带外返回地址验证和系统调用沙盒。
出处 《微型电脑应用》 2004年第11期51-54,共4页 Microcomputer Applications
  • 相关文献

参考文献6

  • 1David Wagner, Jeffrey S. Foster, Eric A. Brewer, and Alexander Aiken. A first steptowards automated detection of buffer overrun vulnerabilities. In Network and Distributed System Security Symposium, pages 3- 17,San Diego, CA, February 2000.
  • 2Manish Prasad, Tzi-cker Chiueh. A Binary Rewriting Defense against Stack based Buffer Overflow Attacks. In the Proceedings of Usenix Annual Technical Conference,San Antonio, TX, June 2003
  • 3Tzi-cher Chiueh, Fu-Hau Hsu. RAD: A CompileTime Solution to Buffer Overflow Attacks. International Conference on Distributed Computing Systems (ICDCS), Phoenix, Arizona, USA, April 2001.
  • 4Vasanth Bala, Evelyn Duesterwald, Sanjeev Banerjia.Dynamo: A Transparent Dynamic Optimization System.In Pro-ceedings of the ACM SIGPLAN 2000 Conference on Programming Language Design and Implementation. 2000
  • 5Anil Somayaji and Stephanie Forrest. Automated response using System-Call delays, pages 185-198.
  • 6Gerardo Richarte. Four different tricks to bypass stackshield and stackguard protection. http://www. corest.com/files/files/11/StackguardPaper. pdf, June 2002.

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部