期刊文献+

基于危险函数的缓冲区溢出检测方法的研究与实现 被引量:6

RESEARCH AND APPLICATION ON RISK FUNCTION BASED BUFFER OVERFLOW DETECTION METHOD
下载PDF
导出
摘要 分析缓冲区溢出原因和现有检测技术,提出一种基于危险函数的缓冲区溢出检测流程。该流程首先对反汇编代码中的危险函数的普通形式和展开形式进行定位,然后对危险函数进行参数分析和动态检测,验证危险函数能否发生溢出,最后通过人工分析技术,进一步对参数分析和动态检测的结果进行验证。给出缓冲区溢出检测流程的具体实现。实验结果表明该检测流程是有效的。 Buffer overflow is analyzed for its reasons along with present buffer overflow detection technologies.A risk function based buffer overflow detection procedure is put forward.The procedure at first locate the general form and unfolded form of risk functions from the disassembly code,then carries out parameter analysis and dynamic detection on them to judge whether those risk functions may cause overflow,and finally by artificial analysis technology performs further verifications on the results of parameter analysis and dynamic detection.The detailed implementation of the buffer overflow detection procedure is given.Experiment result validates the detection procedure.
作者 于继江
出处 《计算机应用与软件》 CSCD 2011年第9期185-187,共3页 Computer Applications and Software
关键词 缓冲区溢出 危险函数 参数分析 动态检测 人工分析 Buffer overflow Risk function Parameter analysis Dynamic detection Artificial analysis
  • 相关文献

参考文献10

  • 1Cowan C, Wangle P, Pu C, et al. Buffer overflows:attacks and defenses for the vulnerability of the decade: DARPA Information Survivability Conference and Exposition [ C ]// [ S. l ] : IEEE Computer Sciety Press, 2000 : 154 - 163.
  • 2eEye Digital Security. Research. Published Advisories [ EB/OL ]. (2007 - 01 - 20 ) [ 2008 - 11 - 01 ]. http ://research. eeye. com/ht- ml/advisories/published/index, html.
  • 3Evans D,Larochelle D. Improving Security Using Extensible Light- weight Static Analysis[ J]. IEEE Software, 2002,19 ( 1 ) :42 - 51.
  • 4Viega J, Bloch J T, Kohno T, et al. ITS4 : A Static Vulnerability Scan- ner for C and C ++ Code[ C]//The 16th Annual Conference Of Com- puter Security Applications, New Orleans, 2000:257 - 267.
  • 5Wheeler D A. Flawfinder[ EB/OL] . ( 2001 - 05 - 28 ) [ 2008 - 09 - 24 ]. http://www, dwheeler, com/flawfinder/ .
  • 6Wanger D, Foster J S, Brewer E A. A first step towards automated de- tection of buffer overrun vulnerabilities: Network and Distributed Sys- tem Security Symposium [ C ]//San Diego, 2000:3 - 17.
  • 7Ruwase O, Lam M S. A Practical Dynamic Buffer A Practical Dynamic Buffer Overflow Detector. ( 2003 - 07 - 22 ) [ 2008 - 09 - 25 ]. ht- tp ://suif. stanford, edu/papers/tunji04, pdf.
  • 8Cowan C, Calton P, Dave M, et al. Stackguard : Automatic adaptive detection and prevention of buffer-overflow attacks [ G ]//Proceedings of the 7th conference on USENIX Security Symposium. San Antonio, 1998:63 - 77.
  • 9Etoh H, Yoda K. Propolice: Improved stack smashing attack detection [ J ]. IPSJ Journal,2002:43 (12) :53 - 61.
  • 10Cowan C, Barringer M, Beattie S. FormatGuard : Automatic Protection From prinff Format String Vulnerabilities[ C]//Proceedings of the 10th conference on USENIX Security Symposium. Washington: USENIX Association, 2001 : 15 - 20.

同被引文献31

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部