期刊文献+

Windows缓冲区溢出Exploit代码分析研究 被引量:2

Windows Buffer Overflow Exploit Code Analysis
下载PDF
导出
摘要 该文首先讨论了缓冲区漏洞的产生原理和一般攻击手段,然后分析总结Windows缓冲区溢出漏洞利用的攻击Exploit代码结构和特征,最后讨论了这些特征在入侵检测领域中的应用以及基于系统调用特征的入侵检测这一最新发展方向。 In this paper we first introduce the principle and attack methods of buffer overflow. Then analyze the structure and features of buffer overflow exploit code and summarize the characters of the code. We also discuss how to use these characters into intrusion detection systems and point out the new develop trend in intrusion detection using the system call character.
出处 《计算机安全》 2008年第1期48-49,52,共3页 Network & Computer Security
基金 国防预研基金资助项目
关键词 缓冲区溢出 Exploit代码 WINDOWS Buffer overflow Exploit code Windows
  • 相关文献

参考文献2

二级参考文献13

  • 1S Forrest, et al. A sense af seaf for unix processes[A]. John McHugh IEEE Symposium on Security and Privacy, Proceedings[C]. Oakland CA:IEEE Computer Society Press, 1996.120 - 128.
  • 2A P Kosoresow, S A Hofmey. Intrusion detection via system call traces[J]. IEEE Software, 1997,14(5) :35 - 42.
  • 3W Lee, et al. Learning patteans from UNIX process execution traces forintrusion detection [A ]. AAAI Wodtshop on AI Approaches to Fraud Detection and Risk Management [C ]. Rhode laland: AAAI Press,1997.50 - 56.
  • 4M Asaka, et al. A new intrusion detection method based on discriminant analysis [J]. IEICE Tram. on Information & Systems, 2001, E-84-B(5) :570 - 577.
  • 5Yihua Liao, V Rao Vemuri. Using text categorization techniques for intrusion detection [ A ]. 11th USENIX Security Symposium [ C ]. San.Francisco, 2002.
  • 6H Debar, et al. Fixed vs. Variable-length pattexns for detecting suspicious process behavior [A] .5th European Symposium on Research in Computer Security [ C ]. Belgium: Springer-Verlag, 1998.1 - 15.
  • 7C Michael, A Ghosh. Two state-based approaches to program-based anomaly detection [DB/OL]. www. acsac, org/2000/parpers/96. pdf.
  • 8R Sekar, et al. A fast automaton-tin.seal method for detecting anomalous program behaviors [ A]. Roger Needham,IEEE Symposium on Securityand Privacy [C]. California: IEEK Computer Society Press,2001. 144- 155.
  • 9Aho A V, M J Corasick. Efficient suing matching: an aid to bibliographic search [J] .Communications of the ACM, 1975:333 - 340.
  • 10http://www.cs. unm. edu/- immsec/data [OL].

共引文献16

同被引文献14

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部