期刊文献+

静态检测缓冲区溢出漏洞 被引量:3

Statically Detecting Buffer Overflow Vulnerabilities
下载PDF
导出
摘要 缓冲区溢出漏洞是目前惟一最重要最常见的安全威胁。文中分析了防止缓冲区溢出攻击的运行时方法的不足。介绍了一种静态检测缓冲区溢出漏洞的方法及工具。给源代码添加注解,用注解辅助静态分析,用这种方法能够在软件交付使用前,检测出程序中潜在的安全漏洞。 Buffer overflow vulnerabilities may be today's singlemost important and most common security threat.In this paper,first analyzes the shortcomings of run-time defenses of buffer overflow attacks, and then presents an approach and a tool to statically detect buffer overflow vulnerabilities.By adding annotations to source code and using annotation-assisted static analysis,the approach can detect potential safety vulnerabilities in the programs before the software is deployed.
作者 李建平 刘坚
出处 《微机发展》 2004年第6期99-101,共3页 Microcomputer Development
基金 武器装备预研基金资助项目(51406070101DZ0151)
关键词 缓冲区溢出 安全漏洞 静态分析 静态检测 注解 SPLINT buffer overflow safety vulnerabilities static analysis statically detecting annotation Splint
  • 相关文献

参考文献5

  • 1Cowan C,Wagle P,Pu C,et al.Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decade[EB/OL].http://www.cse.ogi.edu/DISC/projects/immunix/discex00.pdf,2000-01.
  • 2Pethia R.Bugs in the Programs[A].Keynote address at 8th ACM SIGSOFT Foundations of Software Engineering[C].US:SEI CMU,2000.
  • 3Snow B.Future of Security[A].Panel presentation at IEEE Security and Privacy[C].US:[s.n.],1999.
  • 4StackGuard Development Team. StackGuard Mechanism: Stack Integrity Checking[EB/OL].http://www.cse.ogi.edu/DISC/projects/immunix/StackGuard/mechanism.html,1999.
  • 5Evans D,Larochelle D.Splint Manual[EB/OL].http://www.splint.org/downloads/manual.pdf,2002-02.

同被引文献12

  • 1王磊,张玉清,王力,郎良.系统缓冲区溢出攻击防范体系的建立[J].计算机工程,2004,30(12):106-108. 被引量:8
  • 2杨小龙,刘坚.C/C++源程序缓冲区溢出漏洞的静态检测[J].计算机工程与应用,2004,40(20):108-110. 被引量:10
  • 3潘亦,吴春梅,武港山.防止缓冲区溢出攻击的增强编译技术分析[J].计算机科学,2005,32(3):156-158. 被引量:4
  • 4蒋烈辉,刘铁铭,费勤福,尹青.通用的嵌入式汇编代码结构分析系统研究[J].计算机工程与应用,2006,42(23):85-87. 被引量:2
  • 5Larochelle D,Evans D.Statically detecting likely buffer overflow vulnerabilities[C]//Proceedings of the l lth USENIX Security Symposium,San Francisco,CA,USA,2002.Ninth Street,Suite,Berkeley, CA,USA:USENIX Association,2002:177-191.
  • 6Theiling H.Extracting safe and precise Control flow from binaries[C]// Seventh International Conference on Real-Time Computing Systems and Applications(RTCSA ' 00), 2000.
  • 7Namballa R,Ranganathan N.Control and data flow graph extraction for high-level synthesis[C]//ISVLSI 2004:Emerging Trends in VLSI Systems Design,2004.
  • 8Cooper K D,Harvey T J,Waterman T.Building a control-flow graph from scheduled assembly code,TR02-399[R].Rice University, June 2002.
  • 9John Wilander,Mariam Kamkar.A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention[C]// Proceedings of the 10th Network and Distributed System Security Symposium.San Diego,California,2003:149-162.
  • 10Arjan van de Ven.New Security Enhancements in Red Hat Enterprise Linux v.3.August 2004[EB/OL].(2005-10-15).https://www.redhat.com/f/pdf/rhel/WHP0006US_Execshield.pdf.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部