期刊文献+

基于k循环随机序列的动态缓冲区溢出防御 被引量:1

Dynamic Buffer Overflow Prevention Based on k Circular Random Sequence
下载PDF
导出
摘要 面向Intel 80×86体系结构和C/C++语言,介绍了栈缓冲区溢出攻击的基本原理及攻击模式,分析了现有的动态防御典型方案的优点与不足.结合基于随机地址空间与签名完整性的防御思想,提出了一种基于k循环随机序列的动态缓冲区溢出防御方案.该方案能够在极大概率下防御多种模式的缓冲区溢出攻击,解决了"连续猜测攻击"的问题,并使软件具有一定的容侵能力. The paper presents an analysis of the principle of stack buffer overflow attacks and basic attack patterns for Intel 80×86 architecture and C/C++.Then,the merits and drawbacks of the existing dynamic buffer overflow prevention methods are discussed.On the basis of the address obfuscation and integrity checking,this paper presents a new dynamic buffer overflow prevention method based on k circular random sequence.This improved prevention method can defend attacks of multiple patterns with high probability and enhance the intrusion-tolerance capability of the vulnerable software.
出处 《同济大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第6期917-924,共8页 Journal of Tongji University:Natural Science
基金 国家"八六三"高技术研究发展计划资助项目(2007AA01Z142) 上海申通地铁集团有限公司项目
关键词 缓冲区溢出 栈溢出 软件漏洞 动态检测 容侵 buffer overflow stack overflow software vulnerability dynamic prevention intrusion tolerance
  • 相关文献

参考文献18

  • 1Forst J C,Osipov V,Bhalla N,et al.Buffer overflow attacks:detect,exploit,prevent[M].Rockland:Syngress Press,2005.
  • 2Bovet D P,Cesati M.深入理解Linux内核[M].3版.陈莉君,张琼声,张宏伟,译.北京:中国电力出版社,2007.
  • 3AlephOne.Smashing stack for fun and profit[EB/OL].(1996-11-08)[2009-06-15].http://phrack.com/issues.html?issue=49&id=14#article.
  • 4Wagner D,Fester J,Brewer E,et al.A first step towards automated detection of buffer overrun vulnerabilities[C] //Proceedings of the Network and Distributed Systems Security Symposium.San Diego:Internet Society,2000:1-14.
  • 5Cowan C,Pu C,Maier D,et al.StackGuard:automatic adaptive detection and prevention of buffer-overflow attacks[C] //Proceedings of the 7th conference on UsENIX Security Symposium.San Antonio:USENIX Association,1998:63-78.
  • 6Bhatkar S,Du Varney D C,Sekar R.Address obfuscation:an efficient approach to combat a board range of memory error exploits[C] //Proceedings of the 12th Conference on USENIX Security Symposium.Washington D C:USENIX Association,2003:8-23.
  • 7Strackx R,Younan Y,Philippaerts P,et al.Breaking the memory secrecy assumption[C] //Proceedings of the Second European Workshop on System Security.Nuremburg:ACM New York Press,2009:1-8.
  • 8Pozza D,Sisto R.A lightweight security analyzer inside GCC[C] //Proceedings of IEEE Third International Conference on Availability,Reliability and Security.Barcelona:IEEE Computer Society,2008:851-858.
  • 9Etoh H.ProPolice:Gcc extension for protecting applications from stack-smashing attacks[EB/OL].(2005-08-22)[2009-06-15].http://www.trl.ibm.com/projects/security/ssp/.
  • 10Chiueh T,Hsu F H.RAD:a compile-time solution to buffer overflow attacks[C] //Proceedings of the International Conference on Distributed Computing Systems.Phoenix:IEEE Computer Society,2001:409-417.

同被引文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Forst J C,Osipov V,Bballa N,et al.Buffer overflow attacks:de-tect,exploit,prevent[M].Rockland:Syngress Press,2005.
  • 3Shihjong Kuo.Execute disable bit functionality blocks Malware-Code execution[EB/OL].http://developer.intel.com,2005.
  • 4PaX.PAGEEXE[EB/OL].http://pageexec.virtualave.net/page-exec.txtC,October,2000.
  • 5Bhatkar S,DuVarney D C,Sekar R.Address obfuscation:an effi-cient approach to combat a broad range of memory error exploits[C].In:Proceedings of the 12th Conference on USENIX SecuritySymposium,Washington D C:USENIX Association,2003:8-23.
  • 6Cowan C,Pu C,Maier D,et al.Stack guard:automatic adaptivedetection and prevention of buffer-overflow attacks[C].In:Pro-ceedings of the 7th USENIX Security Symposium,USENIX Asso-ciation,San Antonio,Texas,U.S.A.,Jan.1998:63-78.
  • 7Vendicator.Stack shield technical info file v0.7[EB/OL].ht-tp://www.angelfire.com/sk/stackshield/,January 2001.
  • 8Peter Vreugdenhi.Pwn2Own 2010[EB/OL].http://dvlabs.tip-pingpoint.com/blog/2010/02/15/pwn2own-2010,Match 2010.
  • 9Aleph one.Smashing the stack for fun and profit[J].Phrack,1996,7(49):14.
  • 10Matt Conover.w00w00 on heap overflows[EB/OL].http://www.w00w00.org/articles.html,November,2010.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部