期刊文献+

基于Windows操作系统的栈溢出攻击验证

ATTACK VERIFICATION OF STACK OVERFLOW BASED ON WINDOWS OPERATING SYSTEM
下载PDF
导出
摘要 目前大部分的缓冲区溢出的攻击都是基于摧毁栈的方式.作者针对Windows操作系统,对栈溢出的原理进行了相关分析,并通过实例完成了一个溢出的攻击验证.实验结果表明,针对有漏洞的代码可以进行漏洞攻击,并给出了防止漏洞攻击的几点建议. Currently,the majority of buffer overflow's attack is based on destroys stack's way. This article in view of the Windows operating system, carrie stack overflow principle, and compl pie. Experimental results show that etes an attack verification s on the simple analysis to the of overflow through the examthere are loopholes for the code can be exploits,and giv en several suggestions to prevent exploits.
作者 周蕊 于晓明
出处 《陕西科技大学学报(自然科学版)》 2010年第1期113-117,132,共6页 Journal of Shaanxi University of Science & Technology
关键词 缓冲区溢出 漏洞攻击 网络安全 stack buffer overflow leak attack network security
  • 相关文献

参考文献7

  • 1JAMES C FOSTER.缓冲区溢出攻击-检测、剖析与预防[M].北京:清华大学出版社,2006.
  • 2Aleph. One smashing the stack for fun and profit[J]. Phrack, 1996,7(49) :59-62.
  • 3Teny Bruce Gillette. A unique examination of the buffer overfolw condition[D]. Bachelor of Science Ocean Engineering Florida Institute of Technology,2002.
  • 4Whitehouse O. Analysis of GS Protections in Microsoft Windows Vista[EB/OL]. http://www.symantec. com/avcenter/ reference/GS Protections in Vista. pdf,2007-03-30.
  • 5Russinovich M E, Solomon D A. Microsoft Windows Internals[M]. Microsoft Windows Server,2003.
  • 6孙晓妍,武东英,季明,郭宁.Windows系统下RPC堆溢出的研究[J].微电子学与计算机,2007,24(6):170-172. 被引量:2
  • 7许俊杰,蔡皖东.一种远程缓冲区溢出漏洞检测模型及系统实现[J].计算机科学,2008,35(6):60-62. 被引量:3

二级参考文献12

  • 1曾凤.缓冲区溢出攻击的防范策略[J].微电子学与计算机,2005,22(9):51-53. 被引量:3
  • 2唐洪英.一种防止缓冲区溢出攻击的新方法[J].微电子学与计算机,2006,23(4):68-70. 被引量:2
  • 3Nicolas Falliere.A new way to bypass windows heap protections[EB/OL].http://www.securityfocus.com/infocus/1846
  • 4DCE 1.1:Remote Procedure Call[EB/OL].http://www.opengroup.org/public/pubs/catalog/c706.htm
  • 5Alexander Anisimov.Defeating Windows XP SP2 Heap protection and DEP bypass[EB/OL].http://www.maxpatrol.com/defeating-xpsp2-heap-protection.pdf
  • 6王炜,方勇.缓冲区溢出教程.北京:北京中电电子出版社,2005
  • 7Wagner D, Foster J, Brewer E, et al. A first step towards automated detection of buffer overrun vulnerabilities//Network and Distributed System Security Symposium. San Diego, CA, February 2000
  • 8Hsueh M, Tsai T,Iyer R. Fault injection techniques and tools. IEEE Computer, April 1997:75-82
  • 9Wilander J, Kamkar M. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention//Proceedings of the 10th Network and Distributed System Security Symposium. San Diego, CA, February 2003:149-162
  • 10Viega J, Bloch J T, Kosho T, et al. 1TS4 : A Static Vulnerability Scanner for C and C++ CodeffAnnual Computer Security Applications Conference. December 2000

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部