期刊文献+

基于段长限制的缓冲区溢出保护

Buffer Overflow Protection Based on Segment Limitation
下载PDF
导出
摘要 为防范缓冲区溢出攻击,在Intel32位CPU及Windows系统下实现了不可执行堆栈。设计了一个内核驱动程序,将应用程序的堆栈移动到代码区的上部,并修改代码段的限长将堆栈区排除在代码段之外。堆栈中的攻击代码被执行时,CPU就会触发一个保护异常,攻击代码不能继续执行。这种方法能够防范各种已知及未知的堆栈溢出攻击,性能开销低于基于页的防护方式。 A non-executable stack approach is proposed and evaluated to defense against stack-based buffer overflow attacks under Windows and Intel 32-bit CPUs. A kernel device driver is designed to relocate the application's user-mode stack to the higher address and to modify the effective limit in the code segment descriptor, so the relocated stack is excluded from the code segment. Once any malicious code that attempts to execute in the stack, a general-protection exception is triggered, then the malicious code will be terminated, It is highly effective in preventing both known and yet unknown stack smashing attacks, and its performance overhead is lower than the page-based non-executable stack approach.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第10期140-142,共3页 Computer Engineering
基金 国家网络与信息安全保障持续发展计划基金资助项目(2004-1-917-C-017)
关键词 缓冲区溢出攻击 内核驱动程序 计算机安全 Buffer overflow attack Kernel device driver Computer security
  • 相关文献

参考文献5

  • 1王磊,张玉清,王力,郎良.系统缓冲区溢出攻击防范体系的建立[J].计算机工程,2004,30(12):106-108. 被引量:8
  • 2Chien E,Sz(o)r P.Blended Attacks-Exploits,Vulnerabilities and Buffer-overflow Techniques in Computer Viruses[C].Proceedings of Virus Bulletin Conference,Louisiana,2002.
  • 3Crispin C,Calton P,Dave M,et al.Stack-guard:Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks[C].Proceedings of the 7th USENIX Security Conference,San Antonio,1998.
  • 4Data Security Software Inc.OverflowGuard 1.0[EB/OL].http://www.datasecuritysoftware.com,2004-11-20
  • 5A Detailed Description of the Data Execution Prevention[EB/OL].http://support.microsoft.com/kb/875352,2004-08.

二级参考文献5

  • 1McGraw G, Viega J.Make Your Software Behave:Learning the Basics of Buffer Overfiows.http://www-900.ibm.com/developerWorks/cn/security/overflows/index_eng. shtml
  • 2McGraw G,Viega J, Make Your Software Behave:An Anatomy of Attack Code.http://www-900.ibm.com/developerWorks/cn/security/attack/index_eng.shtml
  • 3McGraw G, Viega J. Make Your Software Behave: Preventing Buffer Overflows .http://www-900. ibm .com/developer Works/c n/security/buffer-defend/index_eng.shtml
  • 4.缓冲区溢出[EB/OL].http://www. sinou.com/jszq/subarea/netsecurity/paper/2002102615.asp,.
  • 5薛静锋.Linux下防范缓冲区溢出攻击的系统安全策略[EB/OL].http://www-900.ibm.com/developerWorks/cn/security/se-lbuffer/index.shtml,.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部