期刊文献+

缓冲区溢出攻击原理分析与防范方法研究

The Research on Principle Analysis and Prevention Methods of Buffer Overflow Attack
下载PDF
导出
摘要 将分析缓冲区溢出攻击的原理,通过实例对缓冲区溢出攻击的产生进行分析.结合缓冲区溢出攻击的类型阐述了应当如何根据现实情况来采取相应的措施,来防范缓冲区溢出攻击和尽可能的降低其所带来的损失. The principle of buffer overflow attacks is introduced in this paper. Why to appear attacks in buffer overflow is analyzed by using codes. With the kinds of buffer overflow attacks, how to adopt corresponding measures according to the reality of the situation to prevent buffer overflow attacks and reduce the loss as soon as possible are explained.
作者 王春霞 张莉
机构地区 福建师范大学
出处 《哈尔滨师范大学自然科学学报》 CAS 2013年第6期45-48,共4页 Natural Science Journal of Harbin Normal University
关键词 缓冲区溢出 堆溢出 栈溢出 攻击 防范 Buffer overflow Heap overflow Stack overflow Attack Prevent
  • 相关文献

参考文献6

二级参考文献27

  • 1林志强,夏耐,茅兵,谢立.缓冲区溢出研究综述[J].计算机科学,2004,31(9):110-113. 被引量:4
  • 2肖道举,陈博文,陈晓苏.一种基于程序逻辑结构分析的缓冲区溢出攻击抵御方法[J].计算机工程与科学,2005,27(5):10-12. 被引量:1
  • 3王业君,倪惜珍,文伟平,蒋建春.缓冲区溢出攻击原理与防范的研究[J].计算机应用研究,2005,22(10):101-104. 被引量:12
  • 4陈志强,严晓浪.CPU微结构中侦测和防止缓冲区溢出的实现[J].固体电子学研究与进展,2006,26(2):214-219. 被引量:1
  • 5.Ipxodi Windows 系统下的堆栈溢出.http://rnagaine.nsfocus.com/detail.asp Id=439.,.
  • 6.Warning3,书写 linux下自已的 shellcode.http://security.nsfocus.com/showQueryL.asp. libID=256.,.
  • 7Wagner D,Foster J S. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities[EB/OL]. http://www. cs. berkeley. edu/-daw/papers/overruns-ndss00. ps, 2000.
  • 8Holzmann G J, Smith M H. Software Model Checking: Extracting verification models from source code[J]. Software Testing Verification and Reliability, 2001,11 (6):65-79.
  • 9Holzmann G J. The Model Checker Spin [J]. IEEE Trans on Software Engineering, 1997,23 (5): 279-295.
  • 10Larochelle D, Evans D. Statically Detecting Likely Buffer Over flow Vulnerabilities[C]//Proceedings of the USENIX Security Symposium. 2001.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部