期刊文献+

防御Windows栈溢出攻击的新方法

New Method to Defend against Stack Smashing Attacks for Windows
下载PDF
导出
摘要 针对栈溢出攻击依然是流行的计算机系统攻击手段的状况,文章为Windows开发了一个工作在装配时刻的防御栈溢出攻击的新方法,它运用栈溢出攻击检测机制来改写给定的可执行文件,不需要源代码支持。本文建立了相应的技术原型,它可以应用于简单应用程序、DLL、多线程应用程序和多线程应用程序使用的DLL,并能成功防御现实攻击。 Stack smashing is still one of the most popular techniques for computer system attack. An anti-stack-smashing defense technique for Microsoft Windows systems is presented in this paper. This technique, which consists of instrumenting a given executable with a mechanism to detect stack smashing attacks, works at install-time and does not rely on having access to the source-code. This paper developed a prototype for simple applications, DLLs, muhithreaded applications, and DLLs used by muhithreaded applications, and verified that it successfully defends against actual exploit code.
出处 《信息工程大学学报》 2006年第4期351-354,共4页 Journal of Information Engineering University
基金 河南省科技局科技攻关计划资助项目(SP200402089)
关键词 主机安全 缓冲区溢出 栈溢出攻击 computer security buffer overflow stack smashing
  • 相关文献

参考文献6

  • 1Baratloo A,Singh N,Tsai T.Transparent Run-time Defense against Stack Smashing Attacks[C]//USENIX Annual Technical Conference,2000,251-262.
  • 2CERT/CC Statistics 1988-2006.[DB/OL] http://www.cert.org /stats/cert-stats.html.2006.
  • 3Cristina C,Mike V E.Recovery of Jump Table Case Statements from Binary Code[J].Science of Computer Programming,2001,40(2):171-188.
  • 4Cullen L,Saumya D.Obfuscation of Executable Code to Improve Resistance to Static Disassembly[C]//10th ACM Conf.Computer and Comm.Security (CCS),2003,290-299.
  • 5Microsoft Windows RegEdit.exe Registry Key Value Buffer Overflow Vulnerability[EB/OL].http://www.securityfocus.com/bid/7411,2003.
  • 6Daniel C D,Venkatakrishnan V N,Bhatkar S.SELF:A Transparent Security Extension for ELF Binaries[C]//2003 Workshop New Security Paradigms,2003,29-38.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部