期刊文献+

基于代码插装的缓冲区溢出漏洞定位技术 被引量:2

Buffer Overflow Vulnerability Location Technology Based on Code Instrumentation
下载PDF
导出
摘要 为准确快速地找到缓冲区溢出漏洞点,提出一种通过代码插装对二进制文件中的缓冲区溢出漏洞自动定位的方法。使用PIN提供的函数编写程序分析工具,在程序执行过程中记录所需的信息。当检测到内存访问错误异常时,判别破坏内存的情况,获取内存破坏点,查找到非法写内存的指令定位漏洞。实例分析表明,该方法不需要源程序且效率较高,能成功地定位常见的缓冲区溢出漏洞。 In order to find buffer overflow vulnerability point accurately and rapidly, this paper proposes a method that can f'md buffer overflow vulnerabilities in binary file through code instrumentation. It uses plentiful functions PIN providing to make program analysis tool and saves information needed during program execution. When detecting memory access violation exception, it distinguishes what class of memory corruption and obtains memory corruption point and seeks illegal memory writing instruction to locate vulnerability. Example analysis shows that the method does not need source program, and has higher efficiency, it can locate popular buffer overflow vulnerabilities successfully.
作者 史胜利
出处 《计算机工程》 CAS CSCD 2012年第9期138-140,共3页 Computer Engineering
关键词 漏洞定位 代码插装 返回地址 函数指针 异常 缓冲区溢出 vulnerability location code instrumentation return address function pointer exception buffer overflow
  • 相关文献

参考文献8

  • 1Satoshi K,Hiroyuki K,Ryota S.Base Address Recognition withData Flow Tracking for Injection Attack Detection[C]//Proc.of the12th IEEE Pacific Rim International Symposium on DependableComputing.Riverside,USA:IEEE Computer Society,2006.
  • 2房陈,茅兵,谢立.基于动态染色的内存漏洞定位技术[J].计算机工程,2010,36(7):139-141. 被引量:4
  • 3Suh G E,Lee J,Devadas S.Secure Program Execution viaDynamic Information Flow Tracking[C]//Proc.of ASPLOS-XI’04.New York,USA:[s.n.],2004.
  • 4Smirnov A.DIRA:Automatic Detection,Identification,and Repairof Control-hijacking Attacks[C]//Proc.of NDSS’05.San Diego,USA:[s.n.],2005.
  • 5Sezer E C,Ning Peng,Kil C.MemSherlock:An AutomatedDebugger for Memory Corruption Vulnerabilities[C]//Proc.of the14th ACM Conference on Computer and Communication Security.Alexandria,USA:ACM Press,2007.
  • 6Xu Jun,Ning Peng,Kil C.Automatic Diagnosis and Response toMemory Corruption Vulnerabilities[C]//Proc.of the 12th ACMConference on Computer and Communications Security.Alexandria,USA:ACM Press,2005.
  • 7葛毅,茅兵,谢立.基于内存更新记录的漏洞攻击错误定位方法[J].计算机科学,2009,36(1):252-255. 被引量:2
  • 8Luk C K,Cohn R,Muth R.Pin:Building Customized ProgramAnalysis Tools with Dynamic Instrumentation[C]//Proc.of 2005ACM SIGPLAN Conference on Programming Language Designand Implementation.Chicago,USA:[s.n.],2005.

二级参考文献26

  • 1夏耐,郭明松,茅兵,谢立.基于简化控制流监控的程序入侵检测[J].电子学报,2007,35(2):358-361. 被引量:5
  • 2McGraw G. Software Security. IEEE Security & Privacy, 2004, 2(2) :80-83
  • 3One A. Smashing The Stack For Fun And Profit. Phrack, 1996, 7(49)
  • 4Argamal L. Ftpd: the advisory version . bugtraqmailinglist, 2 3 June 2000. http://www.securityfocus. com/archive/1/66544
  • 5Kaemp~ M. Vudo malloc tricks, http://www. phrack. org/phrack/57/p57-0x08
  • 6Cowan C. StackGuard : Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks// 7th USENIX Security Conference. San Antonio, Texas, USA, 1998
  • 7Chiueh T, et al. RAD: A Compile-time Solution to Buffer Overflow Attacks//Proeeedings of The 21st IEEE International Conference on Distributed Computing System. April 2001
  • 8The PaX team. http://pax. grsecurity.net
  • 9Lin Zhiqiang , et al. AutoPaG : Towards Automated Software Patch Generation with source. ASIACCS, 2007
  • 10Korel B, Laski J. Dynamic program slicing. 1988

共引文献4

同被引文献31

  • 1舒畅,李龙腾.软件测试中的插装技术[J].火力与指挥控制,2005,30(S1):140-142. 被引量:1
  • 2梁应宏,陈绍强.用YACC实现程序插装器[J].北京邮电大学学报,1997,20(1):30-35. 被引量:6
  • 3钟芳挺,刘超,金茂忠.程序动态分析系统中插装方式的改进[J].计算机工程与设计,2007,28(19):4585-4588. 被引量:6
  • 4Caca labs. Zzuf-Multi-purpose fuzzer[ EB/OL]. http:// caca. zoy. org/wiki/zzuf.
  • 5A pure-python fully automated and unattended fuzzing framework [ EB/OL ]. https ://github. conv'OpenRCE/sulley.
  • 6Eddington M. Peach fuzzer[ EB/OL]. http://peachfuzzer. corn/.
  • 7Sogeti ESEC Lab. Fuzzgrind [ EB/OL ]. http://eseclab. sogeti, com/pages/Fuzzgrind.
  • 8FuzzBALL: Vine-based binary symbolic executi-on[ EB/OL]. https ://github. com/b tblaze-fuzzball/fuzzball.
  • 9杨滨诚,茅兵.输入相关的缓冲区溢出检测和定位[c]//2010(第三届)全国网络与信息安全学术会议,2010:103-108.
  • 10Newsome J, Song D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software [ C ]//Proceedings of the Network and Distributed System Security Symposium ,2005.

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部