期刊文献+

基于缓冲区溢出的木马研究

Research on Trojan Horse Based on Buffer Overflow
下载PDF
导出
摘要 本文主要分为两个部分:第一部分主要是介绍了目前存在于计算机系统攻击中最普遍的缓冲区漏洞问题,集中阐述了其溢出原理、利用缓冲区溢出进行攻击的原理;第二部分详细介招了利用缓冲区溢出原理进行木马植入攻击的原理以及实现方式。 This paper is divided tO two parts:the first part mainly introduces the most common attack in computer system which is based on the buffer overflows.It analyses the buffer overflow principle and how to use it to attack system.The second part introduces the principle and the realization of how to use buffer overflow to insert Trojan horse to attack computer system.
作者 智明 郑姨婷
出处 《微型电脑应用》 2006年第9期12-14,4,共3页 Microcomputer Applications
关键词 缓冲区 溢出 木马 Buffer Overflow Trojan horse
  • 相关文献

参考文献9

二级参考文献26

  • 1王磊,张玉清,王力,郎良.系统缓冲区溢出攻击防范体系的建立[J].计算机工程,2004,30(12):106-108. 被引量:8
  • 2.Ipxodi Windows 系统下的堆栈溢出.http://rnagaine.nsfocus.com/detail.asp Id=439.,.
  • 3.Warning3,书写 linux下自已的 shellcode.http://security.nsfocus.com/showQueryL.asp. libID=256.,.
  • 4Mark W Eichin, et al. An Analysis of the Intemet Virus of November 1988[ C]. IEEE Computer Society Press, 1989. 326-344.
  • 5微软网站. What You Should Know about the Blaster Worm[EB/OL]. http :∥www. microsoft. com/security/incident/blast. asp,2003.
  • 6.中国网络信息安全."震荡波"E变种病毒全面分析报告[EB/OL].http:∥www.china-infosec.org.cn/virus/index.php?id=7484&page=7484,2004.
  • 7ICAT. Top Ten List[ EB/OL]. http:∥icat. nist. gov/icat. cfm? function = topten ,2003.
  • 8Mark Donaldson. Inside the Buffer Overflow Attack: Mechanism,Method, & Prevention [ EB/OL]. http :∥rr. sans. org/code/inside_buffer. php,2002.
  • 9.对于缓冲区溢出的保护方法[EB/OL].瑞星网站http:∥it.rising. com. cn/newSite/Channels/Safety/SysSafety/Safe- Other/200210/31 - 153601950. htm,2002.
  • 10Crispin Cowan, et al. Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade [ C ]. DARPA Information Survivability Conference and Exposition, 2000.

共引文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部