期刊文献+

缓冲区溢出攻击的分析与防范

Buffer Overflow Attack Analysis and Protection
原文传递
导出
摘要 缓冲区溢出攻击成为黑客攻击技术中最广泛、最危险的一种攻击手段。文章给出了缓冲区溢出的原理,结合具体实例分析了缓冲区溢出攻击的方法,从程序编写、堆栈搬移、返回地址检测以及端口关闭等多个角度对防止缓冲区溢出攻击进行了分析。 Buffer overflow attack has become a huge safety threat. This paper first describes the principles of buffer overflow, then analyzes the process of buffer overflow attack with an actual example. At last, it presents some methods which include programming, stack pointer value modifying, return address detecting and port closing to prevent this kind of attack,
出处 《网络安全技术与应用》 2006年第3期20-22,共3页 Network Security Technology & Application
基金 国家自然科学基金(No.NSFC60473031)资助课题
关键词 缓冲区溢出 网络安全 防范 黑客攻击 buffer overflow network security protection
  • 相关文献

参考文献5

二级参考文献20

  • 1Garfinkel S Spafford G.Practical UNIX amp Internet Security[M].O′Reilly,1996..
  • 2[1]Wagle C C,Pu C,Beattie S,et al.Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decade. DARPA Information Survivability Conference and Exposition,2000-01
  • 3[2]McGraw G, Viega J.Make Your Software Behave:Learning the Basics of Buffer Overflows:Get Reacqluainted with the Single Biggest Threat to Sofmare Security. Reliable Software Technologies,2000-03-01
  • 4[3]Aleph One:Smashing the Stack for Fun and Profit. URL:http://www.shmoo.com/phrack/Phrack49/p49-14,1996-11-08
  • 5Frank Piessens, Bait De Decker, Bait De Win.Developing Secure Software-A survey and classification of common software vulnerabilities.Integrity and Internal Control in Information Systems,IICIS2001.
  • 6Arash Baratloo,Navjot Singh,Timothy Tsai.Transparent Run-Time Defense Against Stack Smashing Attacks[C].In :Proceedings of the USENIX Annual Technical Conference,2000.
  • 7Denning D E.An Intrusion Detection Model[J].IEEE Transaction on Software Engineering, 1987;2(2) :222-232.
  • 8T Ptacek,T Newsham.Insertion,Evasion,and Denial of Service:Eluding Network Intrusion Detection[R].Technical Report,Secure Networks, Inc, 1998-01.
  • 9Richard P Lippmann,Joshua W Haines,David J Fried et al.The 1999 DARPA Off-Line Intrusion Detection Evaluation[C].In:Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection, RAID, 2000.
  • 10IGog. The Frame Pointer Overwrite[ J]. Phrack Magazine, 1999, 9(55).

共引文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部