期刊文献+

一种格式化字符串脆弱性动态检测技术

A Dynamic Detection Technique to Format String Vulnerability
下载PDF
导出
摘要 为了提高计算机软件的安全性,对C程序中的格式化字符串脆弱性的原理、特征进行了分析,在分析的基础上提出了一种动态检测技术.利用此检测技术实现的一种格式化字符串脆弱性检测工具能较准确地检测到C目标程序中的格式化字符串脆弱性.分析结果对编写更安全的C程序具有参考价值,检测技术具有实用价值. In order to improve the security of computer software,the principle and the feature of format string vulnerability in C programs are analyzed.Based on the analysis,a dynamic detection technique is advanced.By taking use of the technique,a detection tool is produced.The tool can efficiently detect format string vulnerabilities in C binary programs.The analysis result can be a reference to make more secure C programs,and the detection technique is practical.
出处 《微电子学与计算机》 CSCD 北大核心 2012年第2期107-110,共4页 Microelectronics & Computer
关键词 格式化字符串 脆弱性 动态检测 原理 特征 目标程序 format string vulnerability dynamic detection principle feature binary program
  • 相关文献

参考文献8

  • 1Tsai T, Singh N. Libsafe 2.0: detection of format string vulnerability exploits [M]. White Paper Ver- sion 3-21-01, Avaya Labs, Avaya Inc, 2001.
  • 2Cowan C, tMrringer M, Beattie S. FormatGuard: automatic protection from printf format string vulner- abilities [C]// proceedings of the IOth USENIX Secu- rity Symposium. Washington, IX;, USA: IEEE, 2001.
  • 3Shankar U, Talwar K, Foster J S. Detecting format string vulnerabilities with type qualifiers[C]//pro- ceedings of the 1Oth USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2001.
  • 4Ringenburg F, Grossman Dan. Preventing format- string attacks via automatic and efficient dynamic checking [C] // proceedings of the 12th ACM Confer- ence on Computer and Communications Security. New York, NY, USA: ACM, 2005.
  • 5马富达,蔡皖东.基于嵌入微LINUX的开机安全认证系统[J].微电子学与计算机,2010,27(7):181-184. 被引量:1
  • 6John Viega, Bloch J T, Tadayoshi Kohno. ITS4.. A static vulnerability scanner for C and C++ code [C] ////proceedings of Annual Computel Security Applica- tions Conference. New or leans, LA: IEEE, 2000.
  • 7程铃.MANET入侵检测技术的研究[J].微电子学与计算机,2010,27(6):57-59. 被引量:6
  • 8Dzintars Avots, Michael Dalton, Benjamin Livshits. Improving software security through a C pointer anal- ysis [C]// proceedings of the 27th International Con- ference on Software Engineering. 2005.

二级参考文献10

  • 1解争龙.基于无线Ad Hoc网络的入侵检测系统体系结构研究[J].微电子学与计算机,2007,24(5):103-105. 被引量:3
  • 2李平均,刘权,李天.基于主被动结合的网络入侵检测系统的设计与实现[J].微电子学与计算机,2007,24(7):50-52. 被引量:5
  • 3Kachirski Q,Guha R.Effective intrusion detection using multiple sensors in wireless Ad Hoc networks[C]//Proc.the 36th Annual Hawaii International Conference on System Sciences(HICSS' 03).Hawaii,USA,2003:57.
  • 4Huang Y,Lee W.A cooperative intrusion detection system for Ad Hoc networks[C]//Proc.the ACM Workshop on Security of Ad Hoc and Sensor Networks(SASN'03).Fairfax,VA,USA,2003:135-147.
  • 5Sterne D,Balasubramanyam P,Carman B,et al.A general cooperative intrusion detection architecture for MANETs[C]//Proc.the 3rd IFFF.International Workshop on Information Assurance(IWIA'05).University of Maryland,USA.2005:57-70.
  • 6Sun B,Wu K,Pooch U W.Alert aggregation in mobile Ad Hoc networks[C]//Proc.the 2003 ACM Workshop on Wireless Security in Conjuction with the 9th Annual International Conference on Mobile Computing and Networking.San Diego,California,USA,2003:69-78.
  • 7Kcphart J O. Biologically inspired defeusos against computer viruses[C]//Proc, Int' L . Conf. n AI (IJCAI - 95). Morgan Kauf mann, San Francisco, 1995 : 985 - 996.
  • 8White S R, Kephart J O, Chess D M. Computer virusas: a global perspective [C]//Proc. Fifth Irat'l Virus Bulletin Conf. VimsBulletin Ltd. England, Abingdon, 1995 : 165 - 181.
  • 9Love R.Linux内核设计与实现[M].2版.陈莉君,译.北京:机械工业出版社,2006.
  • 10廖金祥.硬盘引导扇替换技术及其应用[J].武汉冶金科技大学学报,1998,21(1):97-102. 被引量:1

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部