期刊文献+

缓冲区溢出攻击检测技术的分析和研究 被引量:8

Analysis and Study of Buffer Overflow Attack Detection Technology
下载PDF
导出
摘要 缓冲区溢出攻击是目前最具威胁的攻击方式之一,对信息安全造成了极大的危害。该文通过分析缓冲区溢出攻击的原理,归纳出攻击所必需的3个步骤,根据检测这3个攻击步骤,将当前最常用的缓冲区溢出攻击检测技术分为3种类型,并对其进行了分析和研究。 Buffer overflow attack is one of the most threatening attack types and it jeopardizes information security a lot. According to the principle of the attack, this paper generalizes three necessary steps of a buffer overflow attack. It divides the most popular technologies of buffer overflow attack detection into three types in light of detecting the three attack steps, and also analyzes and studies those technologies.
作者 徐启杰 薛质
出处 《计算机工程》 CAS CSCD 北大核心 2007年第16期142-143,152,共3页 Computer Engineering
关键词 缓冲区溢出 SHELLCODE 攻击检测 buffer overflow ShellCode, attack detection
  • 相关文献

参考文献4

  • 1SANS Institute.The Twenty Most Critical Internet Security Vulnerabilities[Z].(2006-05-31).http://www.sans.ort/top20/.
  • 2CERT.The Computer Emergency Response Team Coordination Center[Z].(2006-05-31).http://www.cert.org/advisories.
  • 3Wagner D,Foster J S,Brewer E A,et al.A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities[C]//Proc.of Network and Distributed System Security.2000.
  • 4蒋卫华,李伟华,杜君.缓冲区溢出攻击:原理,防御及检测[J].计算机工程,2003,29(10):5-7. 被引量:35

二级参考文献3

  • 1[1]Wagle C C,Pu C,Beattie S,et al.Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decade. DARPA Information Survivability Conference and Exposition,2000-01
  • 2[2]McGraw G, Viega J.Make Your Software Behave:Learning the Basics of Buffer Overflows:Get Reacqluainted with the Single Biggest Threat to Sofmare Security. Reliable Software Technologies,2000-03-01
  • 3[3]Aleph One:Smashing the Stack for Fun and Profit. URL:http://www.shmoo.com/phrack/Phrack49/p49-14,1996-11-08

共引文献34

同被引文献23

引证文献8

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部