期刊文献+

基于应用视角的缓冲区溢出检测技术与工具 被引量:5

Buffer Overflow Detection Techniques and Tools Based on Application Perspective
下载PDF
导出
摘要 缓冲区溢出漏洞是危害最为广泛和严重的安全漏洞之一,彻底消除缓冲区溢出漏洞相当困难.学术界、工业界提出了众多缓冲区溢出漏洞检测技术与工具.面对众多的工具,使用者如何结合自身需求有效地选择工具,进而应用到漏洞的检测与修复、预防与保护、度量与评估等方面,是具体而实际的问题.解决这一问题,需要在各异的用户需求与多样的缓冲区溢出检测技术与工具之间建立一张条理清晰、便于用户理解和使用的映射图谱.站在使用者的立场,在概述缓冲区溢出漏洞类型与特征的基础上,从软件生命周期阶段的检测与修复、缓冲区溢出攻击阶段的预防与保护、基于认识与理解途径的度量与评估这 3 个应用视角,对缓冲区溢出漏洞检测技术与工具进行梳理,一定程度上在用户需求、检测技术与工具之间建立了一张映射图谱. Buffer overflow vulnerability is one of the most widely exploited and dangerous security vulnerabilities, it is extremely difficult to eliminate buffer overflow vulnerability completely. A lot of buffer overflow detection techniques and tools have been proposed in the academy and industrial. In the face of numerous tools, itis a specific and practical issue that how could users choose these tools effectively and applied them to the application aspects such as detection and repair, prevention and protection, measurement and assessment. It is necessary to establish a clear map among different user requirements and multiple buffer overflow detection techniques and tools for sake of solving the problem. On the basis of an overview of the types and characteristics of buffer overflow vulnerabilities,buffer overflow detection techniques ant tools are analyzed and elaborated from three application perspectives, i.e. software life cycle based detection and repair, buffer overflow attack stages based prevention and protection, knowledge and understanding based measurement and assessment, which created a map of user requirement and techniques and tools to a certain degree.
作者 司徒凌云 王林章 李宣东 刘杨 SITU Ling-Yun;WANG Lin-Zhang;LI Xuan-Dong;LIU Yang(Department of Computer Science and Technology, Nanjing University, Nanjing 210023, China;State Key Laboratory for Novel Software Technology (Nanjing University), Nanjing 210023, China)
出处 《软件学报》 EI CSCD 北大核心 2019年第6期1721-1741,共21页 Journal of Software
基金 国家重点研发计划(2016YFB1000802) 国家自然科学基金(61632015,61472179,61572249,61561146394) 南京大学博士研究生创新创意项目(2016014)~~
关键词 软件安全 缓冲区溢出 漏洞检测 攻击防护 度量评估 software security buffer overflow vulnerability detection attack prevention and protection measurement and assessment
  • 相关文献

参考文献2

二级参考文献124

  • 1陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(z1):1933-1938. 被引量:115
  • 2赵云山,宫云战.基于符号分析的静态缺陷检测技术研究[博士学位论文].北京:北京邮电大学,2012.
  • 3Ahmad D. The rising threat of vulnerabilities due to integer errors. IEEE Security & Privacy, 2003,1(4):77-82. [doi: 10.1109/ MSECP.2003.1219077].
  • 4Common vulnerabilities and exposures (CVE). http://cve.mitre.org/.
  • 5Definition of 'vulnerabilty' in computer science. 2015. http://en.wikipedia.org/wiki/Vulnerability_%28computing%29.
  • 6Christey S, Martin RA. Vulnerability type distributions in CVE. 2007. http://cve.mitr.e.org/docs/vunl-trends/vuln-trends.pdf.
  • 7Brumley D, Chiueh T, Johnson R, Lin H, Song D. RICH: Automatically protecting against integer-based vulnerabilities. In: Proc. of the 14th Annual Network and Distributed System Security Syrup (NDSS). San Diego: Internet Society, 2007.
  • 8Zhang C, Wang T, Wei TL, Chen Y, Zou W. IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time. In: Proc. of the 15th European Conf. on Research in Computer Security (ESORICS). Berlin, Heidelberg: Springer- Verlag, 2010. 71-86. [doi: 10.1007/978-3-642-15497-3_5].
  • 9Wang TL, Wei T, Lin ZQ, Zou W. lntScope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution. In: Proc. of the 16th Annual Network and Distributed System Security Symp. (NDSS). San Diego: Internet Society, 2009.1-14.
  • 10Chen P, Wang Y, Xin Z, Mao B, Xie L. BRICK: A binary tool for run-time detecting and locating integer-based vulnerability. In: Proe. of the 4th lnt'l Conf. on Availability, Reliability and Security. 2009.208-215. [doi: 10.1109/ARES.2009.77].

共引文献76

同被引文献33

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部