期刊文献+

缓冲区溢出函数定位模型的设计与实现 被引量:2

Design and implementation of model for positioning vulnerable function in buffer overflow
下载PDF
导出
摘要 利用缓冲区溢出漏洞的攻击是当前安全领域面临的主要威胁之一。缓冲区溢出漏洞的分析通常需要从引发该溢出的函数调用入手,溢出函数的定位往往需要耗费大量的时间和精力,因此实现该函数的自动定位可以极大地缩短安全响应时间。针对这种情况,基于Windows调试框架提出并实现了一个缓冲区溢出函数自动定位的模型LVF。简要地介绍了LVF的工作模式,着重讨论了LVF的定位方法,并给出了LVF的框架设计。实验结果表明,LVF能够有效地实现溢出函数的自动定位。 Attacks by vulnerability exploiting of buffer overflow is one of the major threats in current security field.Buffer overflow vulnerability analysis generally starts from the vulnerable function which triggers the overflow,while a lot of time and effort is often required to spend on the positioning of the vulnerable function,achieving the automatic positioning of this function could shorten the response time significantly.In view of this situation,LVF,which is a model of positioning the vulnerable function in a buffer overflow automatically,is proposed and implemented based on Windows debugging framework.The operation mode of LVF is briefly introduced.Positioning method used LVF is discussed,and the framework design of LVF is presented.Finally,experiments are given,which verify that LVF can effectively achieve the automatic positioning of the vulnerable function in a buffer overflow.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第16期3595-3598,3607,共5页 Computer Engineering and Design
关键词 缓冲区溢出 漏洞 SHELLCODE 栈回溯 调试 嵌套调用 buffer overflow vulnerability shellcode stack backtrace debug nested call
  • 相关文献

参考文献8

  • 1Cowan C,Wagle F,Calton Pu Beattie S,et al.Buffer overflows:Attacks and defenses for the vulnerability of the decade[C].DARPA Information Survivability Conference and Exposition,2000.
  • 2阙喜戎,赵耀,王纯,龚向阳.Windows系统中基于缓冲区溢出的攻击的分析[J].计算机应用,2002,22(1):32-34. 被引量:4
  • 3何乔,吴廖丹,张天刚.基于shellcode检测的缓冲区溢出攻击防御技术研究[J].计算机应用,2007,27(5):1044-1046. 被引量:7
  • 4Zhang Ge.The war in the stack[EB/OL].http://www.infosecwriters.com/text_resources/pdf/Stack_GZhang.pdf,2007.
  • 5Arce I.The shellcode generation[J].Security and Privacy,IEEE,2004,2(5):72-76.
  • 6Jeffrey,Christophe Nasarre.Windows VIA CI/C++[M].葛子昂,译.北京:清华大学出版社,2008.
  • 7Mark E Russinovich,David A Solomon.Microsoft(R) Windows(R) internals,fourth edition:Microsoft Windows ServerTM 2003,Windows XP,and Windows 2000[M].潘爱民,译.北京:电子工业出版社,2007.
  • 8Intel Corp.Intel architecture software developer's manual,volume 2,instruction set reference[EB/OL].http://developer.intel.com/design/pentiumii/manuals/243191.htm,2001.

二级参考文献8

  • 1[1]ipxodi.堆栈溢出系列讲座[EB/OL].http://bbs.gznet.edu.cn/cgi- bin/getannounce/groups/GROUP-3/Hacker/whnet/00000029,2000-2.
  • 2[2]dark spyrit.Win32 Buffer Ovenflows[EB/OL].www.phrack.org,2000-3.
  • 3[3]ipxodi.Windows 系统下的堆栈溢出 [EB/OL].www.nsfocus.com,2000-5.
  • 4SKAPE.UnderstandingWindowsShellcode[EB/OL].http://www.hick.org/code/skape/papers/win32-shellcode.pdf,2003-10-23.
  • 5PreventingExploitationwithRebasing[EB/OL].http://archive.cert.uni-stuttgart.de/archive/bugtraq/2003/02/msg00018.html,2003-02-03.
  • 6[美]RICHTER J.Windows核心编程[M].王建华,译.北京:机械工业出版社,2000.545-564.
  • 7COWAN C,WAGLE P,PU C,et al.Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decade[EB/OL].http://www.cse.ogi.edu/DISC/projects/immunix,2000 -01 -27.
  • 8SILBERMAN P,JOHNSON R.A Comparison of Buffer Overflow Prevention Implementations and Weaknesses,iDEFENSE 2004[EB/OL].http://www.blackhat.com/presentations/bh-usa-04/bh-us-04-silbermar/bh-us-04-silberman-paper.pdf,2004-08 -02.

共引文献9

同被引文献10

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部