期刊文献+

GCC编译器中的堆栈保护技术概述 被引量:5

An overview of the stack protection techniques in the GCC compiler
下载PDF
导出
摘要 以堆栈溢出为代表的缓冲区溢出已经成为最为普遍的安全漏洞之一。自从1988年缓冲区漏洞被发现以来,虽然经过几十年的努力,科研人员提出了各种防护方法,但是在操作系统或者软件当中总有新的溢出漏洞或者其变种被发现。为了尽可能避免堆栈溢出漏洞被攻击者利用,一直以来,众多的编译器工作者在GCC编译器中尝试了多种方法来保护内存中的堆栈区域。 Buffer overflow represented by stack overflow has become one of the most common security vulnerabilities.Since the buffer vulnerabilities were discovered,although after decades of efforts,researchers proposed various protection methods,but there are new overflow or the variants were found in the operating system or software.In order to avoid stack overflow vulnerabilities being exploited,so far,many compiler workers have tried many methods to protect the stack and heap area in the GCC compiler.
作者 曹耀彬 王亚刚 CAO Yao-bin;WANG Ya-gang(School of Computer Science,Xi’an University of Posts and Telecommunications,Xi’an 710121,China)
出处 《信息技术》 2017年第7期23-25,共3页 Information Technology
基金 国家自然科学基金资助项目(61136002) 陕西省教育厅科研计划项目(14JK1674)
关键词 GNU编译器集合(GCC) 堆栈 缓冲区溢出 攻击 保护技术 GNU compiler collection (GCC) stack buffer overflow attack protection technology
  • 相关文献

参考文献3

二级参考文献39

  • 1富宇,唐国维,刘显德.缓冲区溢出的预防与检测技术综述[J].计算机工程与应用,2005,41(32):149-152. 被引量:2
  • 2夏一民,罗军,张民选.基于静态分析的安全漏洞检测技术研究[J].计算机科学,2006,33(10):279-282. 被引量:29
  • 3Benjamin A Kuperman, Carla E Brodley, Hilmi Ozdoganoglu,et al. Detection and Prevention of Stack Buffer Overflow Attacks [C]. In: Communications of the ACM, 2005, 48(11):50-56.
  • 4Sandeep Juneja,Victor Nicola. Efficient Simulation of Buffer Overflow Probabilities in Jackson Networks with Feedback[C]. In: ACM Transactions on Modeling and Computer Simulation, 2005,15(4) : 281 - 315.
  • 5Wagner D,Soto P. Mimicry Attacks on Host- based Intrusion Detection Systems[C]. In:ACM Conference on Computer and Communications Security,2002.
  • 6Sekar R,Bendre M,Bollineni P,et al. A Fast Automatonbased Method for Detecting Anomalous Program Behaviors [C]. In t IEEE Symposium on Security and Privacy, Oakland, CA, 2001.
  • 7Wagner D, Dean D. Intrusion Detection via Static Analysis[J]. In:IEEE Symposium on Security and Privacy, Oakland,CA,2001:156 - 169
  • 8Chien E, Szoer P. Blended Attacks Exploits, Vulnerabilities and Buffer--overflow Techniques in Computer Viruses[C]. Proceedings of Virus Bulletin Conference,Louisiana, 2002.
  • 9Crispin Cowan, Steve Beattie, Ryan Finnin Day,et al. Protecting ,Systems from Stack Smashing Attacks with Stack- Guard. http://www, immunix, org/documentation, html.
  • 10BryantRE,0’HallaronDR,龚奕利,雷迎春译.深入理解计算机系统(第2版)[M].北京:机械工业出版社,2010.

共引文献10

同被引文献29

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部