期刊文献+

FPW对缓冲区溢出的实时检测 被引量:2

FPW Detects Buffer Overflow in Real Time
下载PDF
导出
摘要 缓冲区溢出类的安全漏洞是最为常见的一种攻击形式 .本文介绍了缓冲区溢出的机理和作者所设计的 FPW(Frame Pointer Watcher) .FPW通过监视前帧指针来实时检测对函数返回地址的溢出攻击 .和同类工具相比 。 Buffer overflow is one of most common attack on Internet. This paper introduces the mechanism of buffer overflow and the defender FPW(Frame Pointer Watcher).FPW detects the overwriting to return address in real time by monitoring the previous frame pointer in stack. Compared with other bufferoverflow detecting tools, it has higher performance.
出处 《小型微型计算机系统》 CSCD 北大核心 2004年第4期766-769,共4页 Journal of Chinese Computer Systems
基金 863应急项目基金 ( 3 0 1-7-8)资助
关键词 缓冲区溢出 帧指针 前帧指针 返回地址 buffer overflow frame pointer previous frame pointer return address
  • 相关文献

参考文献3

  • 1[1]Crispin Cowan, Calton Pu, Dave Maieret. StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks[C]. Proceedings in the 7th USENIX Security Symposium, January 1998.
  • 2[2]Tzi-cker Chiueh,Fu-Hau Hsu. RAD: a compile-time solution to buffer overflow attacks[C]. International Conference on Distributed Computing Systems (ICDCS), 2001. http://www.ecsl.cs.sunysb.edu/tr/TR96.ps.
  • 3[3]Nathan P Smith. Smashing vulnerabilities in the UNIX operating system[EB/OL]. http://millcomm.com/~nate/machies/security/stack-smashing/nate-buffer.ps,1997.

同被引文献17

  • 1Eric Grevstad.CPU-Based Security:The NX Bit[EB/OL].http://hardware.earthweb.com/chips/article.php/3358421,2004,05
  • 2Shihjong Kuo.Execute-Disable Bit Functionality Blocks Malware Code Execution[EB/OL].http://www.intel.com/cd/ids/developer/asmo-na/eng/149308.htm,2005.08
  • 3AMD and Enhanced Virus Protection[EB/OL].http://www.amd.com/us-en/Weblets/0,7832_11104_11105,00.html,2005.08
  • 4Starr Andersen,Vincent Abella.Changes to Functionality in Microsoft Windows XP Service Pack 2[EB/OL].http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/sp2mempr.mspx,2004,09
  • 5GLASS R L,VESSEY I.Contemporary application-domain taxonomies[J].IEEE Software,1995,12(8):906-916.
  • 6AMOROSO E G.Fundamentals of computer security technology[M].USA:Prentice-Hall PTR,1994.
  • 7FAN Jang-Jong,SU Keh-Yih.An efficient algorithm for match multiple patterns[J].IEEE Trans on Knowledge and Data Engineering,1993,5(2):339-351.
  • 8赵蓓 胡昌振.基于有限自动机的躲避攻击快速检测技术.计算机应用研究,2006,23:973-974.
  • 9LINDQVIST U,JONSSON E.How to systematically classify computer security intrusions[C]//Proceedings of the 1997 IEEE symposium on security and privacy,oakland,USA,May,1997.IEEE Press,1997:154-163.
  • 10TEMPLETION S J,LEVITT K.A requires/provides model for computer attacks[C]//Proceedings of the 2000 new security paradigms workshop.Cork,Ireland:ACM Press,2000:31-38.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部