期刊文献+

基于二进制文件的格式串漏洞检测技术 被引量:1

Detection techniques of format-string vulnerabilities in binary files
下载PDF
导出
摘要 当前有关格式串漏洞的检测技术大多局限于源代码层次,针对二进制文件的研究较少。以格式串栈指针和参数栈指针为切入点,分析研究了格式串漏洞的攻击原理,在目标代码的层次提出了一种新的格式串漏洞检测技术,给出了构造攻击代码的具体方法,重点研究了不同系统中攻击代码的构建过程,最后结合实例对检测方法进行了验证。通过与实例源代码的比较,充分证明了检测方法的有效性,具有重要的应用价值。 Current detection techniques are mostly limited to the source code level, and research on the binary files is few. Based on the stack pointer and the argument pointer of the format-string, the attacking principles of format-string vulnerabilities were researched. A new method to detect format-string vulnerabilities in binary files was brought forward. By analyzing the method that the model adopted, the particular means and processes to construct the attacking codes were presented. In order to improve the effectiveness of the detection, the attacking code constructions for different systems were studied. At last, an example was given to demonstrate the validity of the detection model.
出处 《计算机应用》 CSCD 北大核心 2008年第10期2495-2498,共4页 journal of Computer Applications
关键词 格式串漏洞 二进制文件 堆栈指针 漏洞检测 format-string vulnerabilities binary files stack pointer vulnerabilities detection
  • 相关文献

参考文献14

  • 1Pablo Software Solutions FTP Server格式串溢出漏洞[EB/OL].[2008-04-05]. http://it. rising. com. cn/newSite/Channels/Safety/LatestHole/Hole_Others/200211/12-085508456. htm.
  • 2Exim格式串溢出漏洞[EB/OL].[2008-04-05].http://industry.ccidnet.com/art/230/20050817/611763_1.html.
  • 3绿盟科技[EB/OL].[2008-04-05].http://www.nsfocus.net/vulndb/.
  • 4RINGENBURG M F , GROSSMAN D . Preventing format - string attacks via automatic and efficient dynamic checking[ C] // Proceedings of the 12th ACM Conference on Computer and Communications Security. New York, NY, USA: ACM. 2005:354-363.
  • 5CHEN SHUO, XU JUN, KALBARCZYK Z T, et al. Security vulnerabilities: From analysis to detection and masking techniques[ J]. Proceedings of the IEEE, 2006, 94(2) : 407 -419
  • 6屈晔,张昊.BugScam自动化静态漏洞检测的分析[J].电子产品可靠性与环境试验,2006,24(4):41-45. 被引量:2
  • 7XU JUN, KALBARCZYK Z T, IYER R K. Transparent Runtime Randomization for Security[ Z]. Center for Reliable and High-Performance Computing Coordinated Science Laboratory, 2003.
  • 8SHANKAR U, TALWAR K, FOSTER J S, et al. Detecting format string vulnerabilities with type qualifiers[ C]// Proceedings of the 10th USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2001:16 - 16.
  • 9WALL L , CHRISTIANSEN T , ORWANT J . Programming Perl [ M]. 3rd ed. [ S. l. ] : O'Reilly & Associates, 2000.
  • 10田鹏,李明,李祥和.二进制扫描的缓冲区溢出漏洞探测技术[J].微计算机信息,2007,23(3):97-98. 被引量:2

二级参考文献8

  • 1满靖,闫健卓,王普.异构数据库信息整合系统的测试技术研究[J].微计算机信息,2006,22(02X):161-163. 被引量:8
  • 2[1]Pierre-Alain FAYOLLE,Vincent GLAUME."A Buffer Overflow Study Attacks & Defenses".http://downloads.securityfocus.com/library/report.pdf.
  • 3[2]Crispin Cowan,Perry Wagle,Calton Pu,Steve Beattie,and Jonathan Walpole."Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decade".
  • 4WAGNER D. A First Step Towards Automated Detection of Buffer Verrun Vulnerabilities [EB/OL] . (2005-04-21)[ 2006 -01 -04]. http://www.isoc.org/isoc/conferences/ndss/2000/proceedings/039.pdf.
  • 5Bug Scam分析: [EB/OL]. (2004-04-22) [2006-01-04].http://www.xfoeus.net/artieles/7.html.
  • 6BugScam 简介[EB/OL]. (2003-10-15)[2006-01-04] .http://www.nsfocus.net/index.php?act =sec_tool&do =view&tool_id=389&keyword.
  • 7应用程序安全性的-大进步:证明 C Runtime和Windows API对安全性的影响[EB/OL].(2001-04-01)http://www.microsoft.com/china/msdn/archives/library/techart/appsec.asp.
  • 8DataRescue IDA Pro Disassembler Page : Support and FAQ[EB/OL]. (2006-01-31)[2006-01-04]. http://www.datarescue.com/idabase/idasupport.htm.

共引文献4

同被引文献3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部