期刊文献+

缓冲区溢出的预防与检测技术综述 被引量:2

A Survey of Buffer Overflow Defenses and Detections
下载PDF
导出
摘要 对缓冲区溢出攻击进行预防与检测的各类方法进行了综述,包括增强系统核心、静态分析技术、增强编译器和进行动态检测。 This article analyzes some protection mechanism,including kernel based techniques,static analysis based techniques,compiler based techniques and dynamic detection techniques.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第32期149-152,166,共5页 Computer Engineering and Applications
关键词 缓冲区溢出的预防与检测 Liunx安全 动态检测 buffer overflow defense and detection,Liunx security,dynamic detection
  • 相关文献

参考文献26

  • 1CERT Corrdiongation Center.Cert summary cs-2003-01.http://www. cert.org/summaryies/, 2003.
  • 2Solar Designer.Non-executable user stack.http://www.openwall.com/ linux/, 2000.
  • 3R Wojtczuk.Defeating solar designer non-executable stack patch. http ://www.insecure.org/sploits/non-executable.stack.problems.html, 1998.
  • 4PaX Documentation.http ://pax.grsecurity.neffdocs/pax.txt, 2003.
  • 5David Larochelle, David Evans.Statically Detecting Likely Buffer Overflow Vulnerabilities[C]Jn.Proceedings of the 10th USENIX Security Symposium,Washington D C,2001.
  • 6David Wagner,Jeffrey S Foster,Eric A Brewer et al.A first step towards automated detection of buffer overrun vulnerabilities[C].In:Proc Network and Distributed System Security Symposium ,San Diego,CA, 2000:3-17.
  • 7C Cowan,C Pu,D Maier et al.Stack-Guard:Automatic adaptive detection and prevention ofbuffer-overflow attacks[C].In:Proceedings of the 7th USENIX Security Conference,San Antonio,Texas,1998:63-78.
  • 8David Evans,John Guttag,James Homing et al.LCLint:A tool for using specifications to check code[C].In:Proc ACM SIGSOFT "94 Symposium on the Foundations of Software Engineering,1994:87-96.
  • 9Stackshield-A stack smashing technique protection tool for linux. http ://www.anglefire.congsk/stackshield, 2001.
  • 10Gerardo Richarte.Four different tricks to bypass stackshield and stackguard protection.http ://downloads.securityfocus.conglibrary/Stack- Guard.pdf, 2000.

同被引文献11

  • 1大熊.Windows内置的病毒防护——DEP[J].电脑爱好者,2005(7):86-87. 被引量:2
  • 2谢恒建,胡兆阳.缓冲区溢出攻击的防护技术分析[J].微计算机信息,2005,21(09X):11-13. 被引量:5
  • 3胡忠望,刘卫东.基于CPU硬件的缓冲区溢出攻击的防范技术[J].微电子学与计算机,2006,23(7):9-12. 被引量:2
  • 4池瑞楠.Windows缓冲区溢出的深入研究[J].电脑编程技巧与维护,2006(9):79-81. 被引量:16
  • 5Benjamin A Kuperman, Carla E Brodley, Hilmi Ozdoganoglu,et al. Detection and Prevention of Stack Buffer Overflow Attacks [C]. In: Communications of the ACM, 2005, 48(11):50-56.
  • 6Sandeep Juneja,Victor Nicola. Efficient Simulation of Buffer Overflow Probabilities in Jackson Networks with Feedback[C]. In: ACM Transactions on Modeling and Computer Simulation, 2005,15(4) : 281 - 315.
  • 7Wagner D,Soto P. Mimicry Attacks on Host- based Intrusion Detection Systems[C]. In:ACM Conference on Computer and Communications Security,2002.
  • 8Sekar R,Bendre M,Bollineni P,et al. A Fast Automatonbased Method for Detecting Anomalous Program Behaviors [C]. In t IEEE Symposium on Security and Privacy, Oakland, CA, 2001.
  • 9Wagner D, Dean D. Intrusion Detection via Static Analysis[J]. In:IEEE Symposium on Security and Privacy, Oakland,CA,2001:156 - 169
  • 10Chien E, Szoer P. Blended Attacks Exploits, Vulnerabilities and Buffer--overflow Techniques in Computer Viruses[C]. Proceedings of Virus Bulletin Conference,Louisiana, 2002.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部