期刊文献+

计算机缓冲区溢出安全问题研究 被引量:1

Security Research on Computer Buffer Overflow
下载PDF
导出
摘要 使用缓冲区溢出和suid程序,已经成为计算机黑客高手们为得到远程root权限而最常使用的方法。本文重点分析了使用缓冲溢出攻击的原理,并提出了对应的防范策略。 In order to attack and get the remote root privilege, using buffer overflow and the suid program has become the commonly used method for hackers. In this paper, the attacking principles using buffer overflow on computers are analyzed, and the corresponding protection strategies are also put forward.
作者 叶红 安东升
出处 《计算机工程与科学》 CSCD 2004年第11期37-41,共5页 Computer Engineering & Science
  • 相关文献

参考文献7

  • 1http://www-900.ibm.com/developerWorks/cn/security/overflow/index .shtml,2003-12.
  • 2Arash Baratloo, Timothy Tsai, Navjot Singh. Libsafe: Protecting Critical Element of Stacks[Z]. White Paper, 1999.
  • 3Dreamtech Software Team. Programming for Embedded Systems[M]. Wiley Pub lishing Inc, 2002.
  • 4Aleph One.Smashing the Stack for Fun and Profit[EB/OL]. http://www.cs. ucsb.edu/~jzhou/security/overflow.html,2002-10.
  • 5姚建东,秦军,古志民.Linux缓冲区溢出攻击原理分析及防范[J].计算机应用,2002,22(7):125-127. 被引量:2
  • 6Matt Conover (a.k.a. Shok), w00w00 Security Team. w00w00 on Heap Overflo ws[EB/OL]. http://www.w00w00.org/files/articles/heaptut.txt, 1999-01.
  • 7Cowan, Wagle, C Pu, et al. Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade[A]. Proc of the DARPA Information Survivability C onf and Expo[C]. 1999.

二级参考文献3

  • 1[1]Arash Baratloo, Timothy Tsai, and Navjot Singh. Libsafe: Protecting Critical Element of Stacks.White Paper[M].December 25, 1999.
  • 2[2]Aleph One.Smashing The Stack For Fun And Profit[EB/OL].BBS水木清华站,Oct 1997.
  • 3[3]Matt Conover (a.k.a. Shok) & w00w00 Security.w00w00 on heap Overflows[EB/OL].http://www.w00w00.org/files/articles/heaptut.txt,January 1999.

共引文献1

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部