期刊文献+

基于Linux地址空间随机化的缓冲区溢出研究 被引量:1

Buffer Overflow Research based on Address Space Randomization in Linux
下载PDF
导出
摘要 缓冲区溢出攻击是一种被广泛利用并危害严重的攻击方式,已经成为计算机系统安全亟待解决的重要问题。在分析缓冲区溢出攻击原理的基础上,给出了主要的防御方法,重点探讨了Linux系统下地址空间随机化防御方法的实现,研究了如何绕过其防护的缓冲区溢出攻击方法,并对其防护效果进行了分析。结果表明,地址空间随机化技术能有效降低缓冲区溢出攻击成功的概率,但不能完全阻止攻击。 Buffer overflow attack has been widely used and could cause great damage. It has become an important issue of computer system security. This paper analyzes the principle of buffer overflow attack, and presents common methods for defending the attack. Then the implementation of defense method for address space randomization in Linux system is mainly discussed, and buffer overflow attack methods for bypassing the defense are proposed. Finally, the effectiveness evaluation of the defense is also given. The results show that address space randomization technique can effectively reduce the probability of successful buffer overflow attacks, but it can not prevent attacks completely.
作者 俞晓鸿 陆瑶 YU Xiao-hong, LU-Yao (Tongji University, Shanghai 201804, China)
机构地区 同济大学
出处 《电脑知识与技术》 2011年第1期90-93,共4页 Computer Knowledge and Technology
关键词 缓冲区溢出 LINUX 地址空间随机化 攻击 防御 buffer overflow Linux address space randomization attack defense
  • 相关文献

参考文献8

  • 1SANS Institute.Top 20 security vulnerabilities[EB/OL].http://www.sans.org/top20/.
  • 2Forst J.C,Osipov V.,Bhalla N.,et al.Buffer overflow attacks:detect,exploit,prevent[M].Rockland:Syngress Press,2005.
  • 3A.Baratloo,N.Singh,T.Tsai.Transparent run-time defense against stack smashing attacks[C].Proceedings of 2000 USENIX Annual Technical Conference (USENIX'00).California:Usenix Association,2000:251-262.
  • 4Kumar Avijit,Prateek Gupta,Deepak Gupta.TIED,LibsafePlus:Tools for runtime buffer overflow protection[C].Proceedings of the 13th Conference on USENIX Security Symposium.Berkeley:Usenix Association,2002:191-206.
  • 5PaX[EB/OL].Http://pageexec.virtualave.net.
  • 6Gaurav S.K.,Angelos D.K.,Vassilis Prevelakis.Countering code-injection attacks with instruction-set randomization[C].Proceedings of the 10th ACM Conference on Computer and Communications Security.New York:ACM Press,2003:272-280.
  • 7Hackisle.突破ASLR保护和编译器栈保护[EB/OL].http://blog.chinaunix.net/u3/102108/showart_2025891.html.
  • 8Tyler Durden.Bypassing PaX ASLR protection[J/OL].Phrack Magazine,2002,11(59).

同被引文献4

  • 1孙晨,雷英杰,路艳丽.最新Linux内核NX实现技术分析[J].现代电子技术,2006,29(4):30-32. 被引量:2
  • 2Arjan van de Ven.Limiting buffer overflows with ExecShield. http://redhat.com .
  • 3PaX Team. Home page of the PaX Team.http://pageexec.virtualave.net .
  • 4Xu Jun,Kalbarczyk Z,Iyer R K.Transparent runtime randomization for security[].Proceeding of thend International Symposium on Reliable Distributed Systems (SRDS’’ ).

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部