期刊文献+

Windows异常处理与软件安全 被引量:6

Windows Exception Handling and Software Security
原文传递
导出
摘要 Windows异常处理机制与软件安全关系密切,先概述Windows异常处理机制的一般概念(系统提供的支持、高级语言和编译器的封装等),接着讨论其在软件保护方面的应用,最后讨论其被用于软件漏洞攻击的原理以及针对性的改进。异常处理机制是Windows系统提供的一套强大而优雅的处理约定,在程序设计和信息安全领域随处可见,程序员、信息安全相关人员等都应当对其有深入的研究。 Windows exception handling mechanism is closely- related with software security. This paper first briefs this mechanism,including its system support,high-level languages and compiler encapsulation and so on,then analyzes its applications in software protection,finally discusses the principle of its applications in buffer overflow attack and in-accordance improvements. Windows exception handling mechanism is a strong and elegant agreement provided by OS and used widely in software industry,and could seen anywhere in programming and information security,and thus the programmers and infosec-related persons should have an in-depth study of it.
出处 《信息安全与通信保密》 2011年第4期58-60,共3页 Information Security and Communications Privacy
关键词 异常处理 软件安全 漏洞攻击 exception handling software security vulnerability attack
  • 相关文献

参考文献5

二级参考文献7

共引文献11

同被引文献20

  • 1毛澄映,卢炎生.C++程序中异常处理的分析与测试技术研究[J].小型微型计算机系统,2006,27(3):481-485. 被引量:5
  • 2Dionysus Blazakis. Interpreter Exploitation :Pointer Inference and JIT Spraying [ R ]. Black Hat Federal, 2010.
  • 3CHEN Xiabo, XIE Jun. Defeat Windows 7 Browser Memory Protection [ R]. XCon 2010.
  • 4Derek Soeder. Memory Retrieval Vulnerabil- iYes [ EB/OL]. http: //www. eeye. corn/ eEyeDigitalSecurity/media/ResearchPapers/ eeyeMRV-Oct2006, pdf, 2006.
  • 5Ben Hawkes. Attacking the Vista Heap [ EB/ OL ]. http: //www. lateralsecurity, corn/ downloads/hawkes_ ruxcon - nov - 2008. pdf, 2008-11.
  • 6Chris Valasek. Understanding the Low Frag- mentation Heap [ EB/OL ]. http. //illmat- ies. com/Understanding_ the LFH Slides.pdf, July, 2010.
  • 7Tarjei Mandt. Kernel Attacks through User- Mode Callbacks [ R ]. USA, Black Hat, 2011.
  • 8Chris Valasek, Tarjei Mandt. Windows 8 Heap Internals [ R ]. USA, Black Hat, 2012.
  • 9晁永胜,郑秋梅.软件安全建模与检测[J].计算机仿真,2007,24(10):86-88. 被引量:15
  • 10张明磊,单蓉胜,李小勇.基于Windows系统调用的异常检测模型[J].信息安全与通信保密,2007,29(11):56-57. 被引量:1

引证文献6

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部