期刊文献+

一种抗地址淹没的缓冲区栈溢出算法 被引量:2

Anti-address flooding algorithm for buffer stack overflow
下载PDF
导出
摘要 缓冲区溢出是常见的网络漏洞攻击,其中最重要的是栈溢出攻击。通过分析缓冲区溢出攻击的方法和特点,提出一种基于Stack Shield改进的Ret Protect算法。首先利用IDA Pro对源程序反汇编分析,然后建立新的库函数,并通过修改GCC源代码来实现程序执行时对函数返回地址的备份的方法来检测缓冲区溢出攻击的发生。与其他栈溢出攻击检测方法相比,Ret Protect算法可有效地阻止对返回地址进行淹没的栈溢出攻击,对用户透明,系统兼容性好。 Buffer overflow is common network vulnerability,and the most important one is the stack overflow attack. By analyzing the methods and characteristics of buffer overflow attacks,this paper proposed an improved Ret Protect algorithm based on Stack Shield. This algorithm used IDA Pro for the disassembly analysis of the source program,and then established a new library function. It detected the occurrence of buffer overflow attacks by modifying the GCC source code to realize the backup of the function return address when the program executed. Compared with other stack overflow attack detection methods,the Ret Protect algorithm can effectively prevent the stack overflow attacks on the return address overlay,which is transparent to the user and good compatibility.
出处 《计算机应用研究》 CSCD 北大核心 2017年第12期3758-3761,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61462020 61562015) 广西自然科学基金资助项目(2014GXNSFAA118375) 广西可信软件重点实验室项目(kx201506) 广西密码学与信息安全重点实验室课题(GCIS201619) 广西高等学校高水平创新团队及卓越学者计划资助项目
关键词 缓冲区溢出 栈溢出 地址淹没 返回地址备份 buffer overflow stack overflow address flooding return address backup
  • 相关文献

参考文献2

二级参考文献29

  • 1Eichin M W, Rochlis J A. With Microscope and Tweezers: An Ana-lysis of the Internet Virus of November 1988[C].Proceedings of the 1989 IEEE Computer Society Symposium on Security and Privacy (SSP 89), Oakland California USA: IEEE Computer Society Press, 1989. 326-344.
  • 2CERT/CC. Code Red Worm Exploiting Buffer Overflow in IIS Indexing Service DLL[EB/OL]. http://www.cert.org/advisories/CA-2001-19.html, 2002.
  • 3eEye Digital Security. UPnP--Multiple Remote Windows XP/ME/98 Vulnerabilities[EB/OL]. http://www.eye.com/html/Research/Advisories/AD20011220.html, 2001.
  • 4Aleph One. Smashing the Stack for Fun and Profit[J/OL]. http://www.phrack.org/show.php? p=49&a=14, 1996.
  • 5Jones R W M, Kelly P H J. Backwards-compatible Bounds Checking for Arrays and Pointers in C Programs[C]. Proceedings of the 3rd International Workshop on Automatic Debugging, Linkping Sweden: Linkoping University Electronic Press, 1997. 81-97.
  • 6Dor N, Rodeh M, Sagiv M. CSSV: Towards a Realistic tool for Statically Detecting all Buffer Overflows in C[EB/OL]. http://www.cs.tau.ac.il/~msagiv/cssv.pdf, 2003.
  • 7.Alert7. Solar Designers Non-executable stack的实现机理分析[EB/OL].http://www.xfocus.net/articles/200104/160.html,2001.
  • 8Nergal. The Advanced Return-into-lib(c) Exploits(Pax case study)[J/OL]. http://www.phrack.org/show.php? p=58&a=4, 2001.
  • 9Cowan C, Pu C, Maier C, et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks[C]. Proceedings of the 7th USENIX Security Symposium, 1998. 65-73.
  • 10Gaurav S K, Stephen A E, Gail E K, et al. CASPER: Compiler-Assisted Securing of Programs at Runtime[EB/OL]. http://www.cs.columbia.edu/~gskc/publications/casper.pdf, 2002.

共引文献3

同被引文献11

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部