期刊文献+

缓冲区溢出原理及植入代码的分析研究 被引量:9

Study on Buffer Overflow and Injected Code
下载PDF
导出
摘要 分析缓冲区溢出及其溢出植入代码的组成结构,指出相应的防御措施;通过分析溢出和植入代码的组成结构,给出缓冲区溢出的一般规律和溢出攻击植入代码的结构特征;最后讨论如何根据溢出规律和植入代码的结构特征,采取有效措施来防御缓冲区溢出攻击。 Given the common rule of buffer overflow and the structure character of injected code and corresponding defense measure through analyzing theory of buffer overflow and structure of injected code. At last discuss how to defense buffer overflow by the rule of buffer overflow and the structure character of injected code.
出处 《计算机应用研究》 CSCD 北大核心 2007年第1期164-166,共3页 Application Research of Computers
基金 国家"973"重点资助项目(2002CB312105) 国家信息关防与网络安全保障可持续发展计划资助项目(2001-技2B-005 2002-研2-A-007)
关键词 缓冲区溢出 植入代码 缓冲区溢出防御虚拟机 Buffer Overflow Injected Code DMBOVM
  • 相关文献

参考文献13

  • 1Aleph One.Smashing the Stack for Fun and Profit[J].Phrack,1996,7(49).
  • 2Matt Conover.w00w00 on Heap Overflows[EB/OL].http://www.w00w00.org/articles.html,1999.
  • 3John Wilander,Mariam Kamkar.A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention[C].The 10th Network and Distributed System Security Symposium,2003.
  • 4aXis.缓冲区溢出笔记之-Stack溢出[EB/OL].http://www.ph4nt0m.net,2004.
  • 5邱晓鹏,张玉清,冯登国.缓冲区溢出攻击代码的分析研究[J].计算机工程与应用,2005,41(18):134-135. 被引量:11
  • 6Taeho Oh.Advanced Buffer Overflow Exploit[EB/OL].http://postech.edu/~ohhara,2004-09.
  • 7于晗,孙龙霞,黄承夏.基于Windows缓冲区溢出漏洞的植入型木马研究[J].信息安全与通信保密,2005(7):248-252. 被引量:4
  • 8Compaq.Compaq C for Linux[EB/OL].http:// www.unix.digital.com/linux/compaq_c/,1999.
  • 9Richard Jones,Paul Kelly.Bounds Checking for C[EB/OL].http://www-ala.doc.ic.ac.uk/ phjk/ BoundsChecking.html,1995.
  • 10Crispin Cowan,Calton Pu,Dave Maier,et al.StackGuard:Automatic Adaptive Detection and Prevention of Buffer Overflow Attacks[C].The 7th USENIX Security Conference,1998.63-77.

二级参考文献17

  • 1张涛,董占球.CODEREDII攻击行为的分析[J].计算机应用与软件,2004,21(6):84-88. 被引量:2
  • 2Aleph One.Smashing the Stack for Fun and Profit[J].Phrack,1996;7(49).
  • 3BrianWKemighan DennisMRitchie著 徐宝文译.C程序设计语言[M].北京:机械工业出版社,2001-03..
  • 4InteLIA-32 Intel Architecture Software Developer's Manual[M].Volume 1-3.http://developer.intel.com/design/Pentium4/documentation.htm, 2004.
  • 5Linux Online Inc.Linux Programmer's Manual[M].http://www.linux.org/docs/index.html.
  • 6Thomas Toth,Christopher Kluegel.Accurate Buffer Overflow Detection via Abstract Payload Execution. RAID 2002,LNCS 2516,2002:274-291.
  • 7National Institute of Standards and Technology.ICAT Metabase.http://icat.nist.gov/.
  • 8SANS Institute.The Twenty Most Critical Internet Security Vulnerabilities.http://www.sans.org/top20/.
  • 9.[EB/OL].http: //www.cert.org.,.
  • 10.[EB/OL].http: //www. nsfocus.com.,.

共引文献12

同被引文献31

引证文献9

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部