期刊文献+

基于备份控制流信息的缓冲区溢出监测技术 被引量:2

Detection of buffer overflow by duplication of control flow data
下载PDF
导出
摘要 C/C++在提供灵活的使用方式和高效目标码的同时,由于缺少边界检查机制,缓冲区溢出成为C/C++程序面临的一种严重的攻击威胁。给出了一种缓冲区溢出攻击的动态防护方法。使用在库中声明的数组来备份函数的控制流信息,包括返回地址和栈帧指针,来动态监测非法的篡改行为。该方法可以对缓冲区溢出攻击中的直接攻击和间接攻击均有效防护。通过RIPE基准平台和两道实际应用的测试以及理论比较表明该方法的有效性。 Due to the lack of boundary checking mechanism, buffer overflow is one of the most serious attacks against C/C++ programs. This paper presents a runtime countermeasure for buffer overflow attack. Through duplicating the control flow information with array which declared in the dynamic link libraries, including the return address and the frame pointer of each function, illegal overwriting can be detected dynamically. This method can both detect direct and indirect attack in the buffer overflow attack. Experiments based on the RIPE testbed and two practical tests as well as theoretical analysis show the effectiveness of this method.
出处 《计算机工程与应用》 CSCD 北大核心 2016年第11期101-107,共7页 Computer Engineering and Applications
基金 国家863高技术研究发展计划项目(No.2012AA010901) 国家科技重大专项基金(No.2013ZX01029002) 计算机体系结构国家重点实验室开放课题
关键词 缓冲区溢出 控制流备份 返回地址 帧指针 动态监测 RIPE buffer overflow control flow duplication return address frame pointer runtime monitor RIPE
  • 相关文献

参考文献23

  • 1CNCERT/CC2007年网络安全工作报告[R].中国国家互联网应急中心,2008:11-12.
  • 2国家计算机网络入侵防范中心.2011年重要安全漏洞库[EB/OL].[2014-03-20].http://www.nipc.org.cn/.
  • 3Salamat B,Jackson T,Wagner G,et al.Runtime defense against code injection attacks using replicated execution[J].IEEE Transactions on Dependable and Secure Computing,2012,8(4).
  • 4Moore D,Paxson V,Savage S,et al.Inside the slammer worm[J].IEEE Security and Privacy,2003,1(4):33-39.
  • 5Novark G,Berger E D.Dieharder:securing the heap[C]//Proceedings of the 17th ACM Conference on Computer and Communications Security,New York,2010:573-584.
  • 6Younan Y,Joosen W,Piessens F.Runtime countermeasures for code injection attacks against C and C++programs[J].ACM Computing Surveys(CSUR),2012,44(3).
  • 7Baratloo A,Singh N,Tsai T.Transparent run-time defense against stack smashing attacks[C]//Proceedings of the 2000USENIX Technical Conference,San Diego,California,USA,2000.
  • 8Ruwase O,Lam M S.A practical dynamic buffer overflow detector[C]//Proceedings of The 11th Annual Network and Distributed System Security Symposium,San Diego,USA,2004.
  • 9Richarte G.Four different tricks to bypass stackshield and stackguard protection[J].World Wide Web,2002.
  • 10Etoh H.GCC extension for protecting applicationsfrom stack-smashing attacks[EB/OL].(2000-06-11).http://www.trl.ibm.com/projects/security/ssp.

二级参考文献38

  • 1Forst J C, Osipov V,Bballa N, et al.Buffer overflow attacks : detect, exploit, prevent[M].Rockland: Syngress Press, 2005.
  • 2The PaX Team.Documentation for the PaX project[EB/OL]. [2011-10-15 ].http://pax.grsecurity.net/docs/pageexec.txt.
  • 3The PaX Team.PaX Address Space Layout Randomization (ASLR) [EB/OL]. [2011 - 10-15 ].http://pax.grsecurity.net/ docs/aslr.txt.
  • 4Etoh H.ProPolice: GCC extension for protecting applications from stack-smashing attacks[EB/OL].(2005-08-22) [2011-10-15].http://www.trl.ibm.com/proj ects/security/ssp/.
  • 5Vendicator.Stack Sheild:a stack smashing technique protection tool for Linux[EB/OL]. (2000-01-08) [2011-10-15]. http ://www.angelfire.com/sk/stackshield.
  • 6Bhatkar S, Sekar R, DuVamey D C.Efficient techniques for comprehensive protection from memory error exploits[C]// Proceedings of the 14th USENIX Security Symposium. Baltimore:USENIX Association,2005 : 105-120.
  • 7Shacham H.The geometry of innocent flesh on the bone: retum-into-libc without function calls(on the x86)[C]// Proceedings of the ACM Conference on Computer and Communications Security.Alexandria: ACM Press, 2007: 552-561.
  • 8Rinard M, Cadar C, Dumitran D, et al.A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors)[C]//Proceedings of the 2004 Annual Computer Security Applications Conference.Tucson: IEEE CS Press, 2004: 82-90.
  • 9Brunink M, Subkraut M, Fetzer C.Boundless memory allocations for memory safety and high availability[C]//Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable System & Networks.Hong Kong: IEEE CS Press,2011 : 13-24.
  • 10Solar Designer.Non-executable stack patch[EB/OL].[2011- 10-15].http://www.openwall. com.

共引文献2

同被引文献15

  • 1杨智君,田地,马骏骁,隋欣,周斌.入侵检测技术研究综述[J].计算机工程与设计,2006,27(12):2119-2123. 被引量:45
  • 2Mirkovic J,Reiher P.A taxonomy of DDo S attack and DDo S defense mechanisms[J].Acm Sigcomm Computer Communication Review,2010.
  • 3Ramaki A A,Amini M,Atani R E.RTECA:Real time episode correlation algorithm for multi-step attack scenarios detection[J].Computers&Security,2014.
  • 4Chakrabarti S,Wasserman M,Thubert P,et al.IPv6Neighbor Discovery Optimizations for Wired and Wireless Networks[J].2015.
  • 5Peng Yichun.Research on Intrusion Detection System Based on IRBF.Computational Intelligence and Security(CIS),2012 Eighth International Conference on,17-18 Nov.2012.
  • 6Guo Jianhua.A Negative Selection Algorithm Integrated with Immune Network Theory.Natural Computation(ICNC),2012 Eighth International Conference on,29-31 May 2012.
  • 7Kannan.A.Genetic Algorithm Based Feature Selection Algorithm for Effective Intrusion Detection in Cloud Networks.Data Mining Workshops(ICDMW),2012 IEEE 12th International Conference on,10-10 Dec.2012.
  • 8袁志.一种抵御HTTP洪水攻击的方法[J].计算机应用与软件,2012,29(7):271-273. 被引量:3
  • 9金章赞,廖明宏,肖刚.否定选择算法综述[J].通信学报,2013,34(1):159-170. 被引量:30
  • 10王龙业,罗杰.互联网端口扫描攻击的安全检测方法[J].信息安全与技术,2016,7(2):44-45. 被引量:3

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部