期刊文献+

基于缓冲区溢出的数据驱动型漏洞检测系统总体设计与实现 被引量:4

Design and Realization of Data-driven Vulnerability Detection System Based on Buffer Overflow
下载PDF
导出
摘要 针对缓冲区溢出漏洞提出了一种检测系统并加以实现.检测系统的原理是在原有的语法分析和词法分析的基础上,采用区间运算和改进的Wagner算法等方法,实现了语义分析更深层次上的检测.同已有的检测方法相比,该检测方法实现了对缓冲区溢出漏洞更准确的检测,具有较低的误报率和很好的运行性能. For buffer overflow vulnerabilities, a face detection method is put forward and realized. This detection method is based on the original syntax and lexical analysis, tusing interval arithmetic and improved algorithm of Wagner and other methods, a deeper semantic analysis of the detection is achieved. Compared with existing test methods, the more accurate detection method enables buffer overflow vulnerability detection, has a lower false positive rate and very good running properties.
机构地区 黑龙江财经学院
出处 《哈尔滨师范大学自然科学学报》 CAS 2015年第4期49-53,共5页 Natural Science Journal of Harbin Normal University
基金 黑龙江省教育厅科学技术研究项目(12543024)
关键词 漏洞检测 缓冲区溢出 流程图 模块 原型检测系统 Vulnerability detection Buffer overflow Diagram Module Prototype detection system
  • 相关文献

参考文献4

二级参考文献16

  • 1诸葛建伟,叶志远,邹维.攻击技术分类研究[J].计算机工程,2005,31(21):121-123. 被引量:23
  • 2Louden KC. Compiler Construction Principles and Practice,北京:机械工业出版社,2000.
  • 3Levine JR,Mason T.Lex与Yacc.第二版,北京:机械工业出版社.2003.
  • 4Stroustrup B, The C++ Programming Language, special edition,北京:高等教育出版社,2001.
  • 5Cowan C, Wangle P, Pu C, et al. Buffer overflows:attacks and defenses for the vulnerability of the decade: DARPA Information Survivability Conference and Exposition [ C ]// [ S. l ] : IEEE Computer Sciety Press, 2000 : 154 - 163.
  • 6eEye Digital Security. Research. Published Advisories [ EB/OL ]. (2007 - 01 - 20 ) [ 2008 - 11 - 01 ]. http ://research. eeye. com/ht- ml/advisories/published/index, html.
  • 7Evans D,Larochelle D. Improving Security Using Extensible Light- weight Static Analysis[ J]. IEEE Software, 2002,19 ( 1 ) :42 - 51.
  • 8Viega J, Bloch J T, Kohno T, et al. ITS4 : A Static Vulnerability Scan- ner for C and C ++ Code[ C]//The 16th Annual Conference Of Com- puter Security Applications, New Orleans, 2000:257 - 267.
  • 9Wheeler D A. Flawfinder[ EB/OL] . ( 2001 - 05 - 28 ) [ 2008 - 09 - 24 ]. http://www, dwheeler, com/flawfinder/ .
  • 10Wanger D, Foster J S, Brewer E A. A first step towards automated de- tection of buffer overrun vulnerabilities: Network and Distributed Sys- tem Security Symposium [ C ]//San Diego, 2000:3 - 17.

共引文献6

同被引文献30

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部