期刊文献+

嵌入式系统缓冲区溢出攻击防范技术 被引量:1

Research of defense scheme against buffer overflow attack in embedded system
下载PDF
导出
摘要 针对嵌入式系统在缓冲区溢出攻击下的脆弱性问题,对开源嵌入式操作系统μC/OS-Ⅱ的内存管理机制进行分析,提出了一种基于块表的内存保护方案。该方案将属于同一任务的内存块归纳到一个域内,并建立块表进行管理,实现了任务地址间的隔离;通过对内存块的访问进行越界检查和访问控制,有效地防范了针对嵌入式系统的缓冲区溢出攻击。最后,对该方案进行了有效性分析并在NiosⅡ平台上进行了实验测试,结果表明所提方法可行。 Embedded system is vulnerable to buffer overflow attack.In order to solve this problem,a block based protection scheme was proposed after analyzing the memory management of μC/OS-Ⅱ.By making a combination of all the memory blocks which belong to one task and managing it through the established block_table,the introduced scheme protected the safety through creating isolation between task memories,checking and controlling the access of memory blocks.Then,an effective analysis about this scheme was given.In addition,a buffer overflow attack experiment was operated on Nios Ⅱ with the improved uC/OS-Ⅱ,and the results show that the proposed scheme is feasible.
出处 《计算机应用》 CSCD 北大核心 2012年第12期3449-3452,共4页 journal of Computer Applications
基金 中国博士后特别基金资助项目(201003757)
关键词 嵌入式系统 缓冲区溢出攻击 地址隔离 访问控制 μC OS-Ⅱ embedded system buffer overflow attack address isolation access control μC/OS-Ⅱ
  • 相关文献

参考文献12

二级参考文献39

  • 1黄贤英,王越,陈媛.嵌入式实时系统内存管理策略[J].计算机工程与设计,2004,25(10):1808-1810. 被引量:15
  • 2李娜,方彦军.嵌入式系统内存规划方法的研究[J].微型机与应用,2005,24(11):74-76. 被引量:4
  • 3孙益辉,陈凯,白英彩.嵌入式操作系统内存管理机制分析及改进[J].计算机应用与软件,2006,23(3):98-99. 被引量:8
  • 4Babin Steve. Developing Software for Symbian OS[M]. 北京:人民邮电出版社,2006.
  • 5Boling Douglas. Programming Microsoft Windows CE. NET [M]. 3rd ed. NY: Microsoft Press,2003.
  • 6Microsoft Co. ,Ltd. Windows Mobile version 5.0 Help Documentation[OL]. [2009 - 06 ]. http://msdn, microsoft, com/ zh-cn/library/bb158532(en-us), aspx.
  • 7NIST, National Vulnerability Database [ EB/OL]. (2010) [2010-07-10]. http://web, nvd. nist. gov. 2010.
  • 8Cowan C, Pu C, Maier D, et al. Stackguard.. automatic adaptive detection and prevention of buffer-overflow attacks[C].//Proceedings of the USENIX Security Symposium. San Antonio, Texas: USENIX, 1998.3-5.
  • 9Vendicator, StackShield : A stack smashing technique protection tool for Linux[EB/OL]. (2000)[2010-07- 101. http://www, angelfire, com/sk/stackshield/info. html, 2000.
  • 10Eugen Leontie, Gedare Bloom, Olga Gelbart, Bhagirath Narahari and Rahul Simha. A compiler-hardware tech- nique for protecting against buffer overflow attacks[J]. Journal of Information Assurance and Security, 2010 (5):1-8.

共引文献29

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部