期刊文献+
共找到346篇文章
< 1 2 18 >
每页显示 20 50 100
Detection of Buffer Overflow Attacks with Memoization-based Rule Set
1
作者 OğuzÖzger HalitÖztekİn 《Journal of Computer Science Research》 2023年第4期13-26,共14页
Different abnormalities are commonly encountered in computer network systems.These types of abnormalities can lead to critical data losses or unauthorized access in the systems.Buffer overflow anomaly is a prominent i... Different abnormalities are commonly encountered in computer network systems.These types of abnormalities can lead to critical data losses or unauthorized access in the systems.Buffer overflow anomaly is a prominent issue among these abnormalities,posing a serious threat to network security.The primary objective of this study is to identify the potential risks of buffer overflow that can be caused by functions frequently used in the PHP programming language and to provide solutions to minimize these risks.Static code analyzers are used to detect security vulnerabilities,among which SonarQube stands out with its extensive library,flexible customization options,and reliability in the industry.In this context,a customized rule set aimed at automatically detecting buffer overflows has been developed on the SonarQube platform.The memoization optimization technique used while creating the customized rule set enhances the speed and efficiency of the code analysis process.As a result,the code analysis process is not repeatedly run for code snippets that have been analyzed before,significantly reducing processing time and resource utilization.In this study,a memoization-based rule set was utilized to detect critical security vulnerabilities that could lead to buffer overflow in source codes written in the PHP programming language.Thus,the analysis process is not repeatedly run for code snippets that have been analyzed before,leading to a significant reduction in processing time and resource utilization.In a case study conducted to assess the effectiveness of this method,a significant decrease in the source code analysis time was observed. 展开更多
关键词 buffer overflow CYBERSECURITY ANOMALY SonarQube MEMOIZATION
下载PDF
Method of integer overflow detection to avoid buffer overflow 被引量:3
2
作者 张实睿 许蕾 徐宝文 《Journal of Southeast University(English Edition)》 EI CAS 2009年第2期219-223,共5页
A simplified integer overflow detection method based on path relaxation is described for avoiding buffer overflow triggered by integer overflow. When the integer overflow refers to the size of the buffer allocated dyn... A simplified integer overflow detection method based on path relaxation is described for avoiding buffer overflow triggered by integer overflow. When the integer overflow refers to the size of the buffer allocated dynamically, this kind of integer overflow is most likely to trigger buffer overflow. Based on this discovery, through lightly static program analysis, the solution traces the key variables referring to the size of a buffer allocated dynamically and it maintains the upper bound and lower bound of these variables. After the constraint information of these traced variables is inserted into the original program, this method tests the program with test cases through path relaxation, which means that it not only reports the errors revealed by the current runtime value of traced variables contained in the test case, but it also examines the errors possibly occurring under the same execution path with all the possible values of the traced variables. The effectiveness of this method is demonstrated in a case study. Compared with the traditional buffer overflow detection methods, this method reduces the burden of detection and improves efficiency. 展开更多
关键词 integer overflow buffer overflow path relaxation
下载PDF
Buffer Overflow Detection on Binary Code 被引量:2
3
作者 郑燕飞 李晖 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期224-229,共6页
Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically th... Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically the potential buffer overflow vulnerabilities in the binary code of software. The binary code was translated into assembly code without the lose of the information of string operation functions. The feature code abstract graph was constructed to generate more accurate constraint statements, and analyze the assembly code using the method of integer range constraint. After getting the elementary report on suspicious code where buffer overflows possibly happen, the control flow sensitive analysis using program dependence graph was done to decrease the rate of false positive. A prototype was implemented which demonstrates the feasibility and efficiency of the new approach. 展开更多
关键词 binary code buffer overflow integer range constraint feature abstract graph
下载PDF
Method of Preventing Buffer Overflow Attacks by Intercepting DLL Functions
4
作者 谭毓安 曹元大 《Journal of Beijing Institute of Technology》 EI CAS 2005年第3期255-259,共5页
The way of intercepting Windows DLL functions against buffer overflow attacks is evaluated. It's produced at the expense of hooking vulnerable DLL functions by addition of check code. If the return address in the sta... The way of intercepting Windows DLL functions against buffer overflow attacks is evaluated. It's produced at the expense of hooking vulnerable DLL functions by addition of check code. If the return address in the stack belongs to a heap or stack page, the call is from illicit code and the program is terminated. The signature of malicious code is recorded, so it is possible for the next attack to be filtered out. The return-into-libc attacks are detected by comparing the entry address of DLL functions with the overwritten return address in the stack. The presented method interrupts the execution of malicious code and prevents the system from being hijacked when these intercepted DLL functions are invoked in the context of buffer overflow. 展开更多
关键词 buffer overflow vulnerability defenses network security
下载PDF
RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow
5
作者 Wang Yong Gu Dawu +2 位作者 Xu Jianping Wen Mi Deng Liwen 《China Communications》 SCIE CSCD 2010年第6期10-16,共7页
Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Int... Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Integer Checking via Buffer overflow). Our approach includes decompile execute file to assembly language; debug the execute file step into and step out; locate the overflow points and checking buffer overflow caused by integer overflow. We have implemented our approach in three buffer overflow types: format string overflow, stack overflow and heap overflow. Experiments results show that our approach is effective and efficient. We have detected more than 5 known integer overflow vulnerabilities via buffer overflow. 展开更多
关键词 integer overflow format string overflow buffer overflow
下载PDF
Program Slicing Based Buffer Overflow Detection
6
作者 Yingzhou Zhang Wei Fu +1 位作者 Xiaofei Qian Wei Chen 《Journal of Software Engineering and Applications》 2010年第10期965-971,共7页
The development of the information technology has brought threats to human society when it has influenced seriously the global politics, economics and military etc. But among the security of information system, buffer... The development of the information technology has brought threats to human society when it has influenced seriously the global politics, economics and military etc. But among the security of information system, buffer overrun vulnerability is undoubtedly one of the most important and common vulnerabilities. This paper describes a new technology, named program slicing, to detect the buffer overflow leak in security-critical C code. First, we use slicing technology to analyze the variables which may be with vulnerability and extract the expressions which will bring memory overflow. Secondly, we utilize debug technology to get the size of memory applied by the variable and the size of memory used for these code segments (the slicing result) further. Therefore we can judge whether it will overflow according to the analysis above. According to the unique excellence of program slicing performing in the large-scale program’s debugging, the method to detect buffer overrun vulnerability described in this paper will reduce the workload greatly and locate the code sentences affected by corresponding variable set quickly, particularly including the potential vulnerability caused by parameter dependence among the subroutines. 展开更多
关键词 Program SLICING buffer overflow Inter-Procedure SLICING DEBUG System DEPENDENCE GRAPH
下载PDF
A Behavior-based Buffer Overflow Attack Blocker
7
作者 ZHANG Li-yuan Jin Li 《电脑知识与技术》 2010年第4期2544-2549,共6页
A common way to gain control of victim hosts is to launch buffer overflow attacks by remote exploits.This paper proposes a behavior-based buffer overflow attacker blocker,which can dynamically detect and prevent remot... A common way to gain control of victim hosts is to launch buffer overflow attacks by remote exploits.This paper proposes a behavior-based buffer overflow attacker blocker,which can dynamically detect and prevent remote buffer overflow attacks by filtering out the client requests that contain malicious executable codes.An important advantage of this approach is that it can block the attack before the exploit code begins affecting the target program.The blocker is composed of three major components,packet decoder,disassembler,and behavior-based detection engine.It decodes the network packets,extract possible instruction sequences from the payload,and analyzes whether they contain attack behaviors.Since this blocker based its effectiveness on the commonest behavior patterns of buffer overflow shellcode,it is expected to detect not only existing attacks but also zero-day attacks.Moreover,it has the capability of detecting attack-size obfuscation. 展开更多
下载PDF
A buffer overflow detection and defense method based on RiSC-V instruction set extension
8
作者 Chang Liu Yan-Jun Wu +1 位作者 Jing-Zheng Wu Chen Zhao 《Cybersecurity》 EI CSCD 2024年第2期28-43,共16页
Buffer overflow poses a serious threat to the memory security of modern operating systems.It overwrites the con-tents of other memory areas by breaking through the buffer capacity limit,destroys the system execution e... Buffer overflow poses a serious threat to the memory security of modern operating systems.It overwrites the con-tents of other memory areas by breaking through the buffer capacity limit,destroys the system execution environ-ment,and provides implementation space for various system attacks such as program control flow hijacking.That makes it a wide range of harms.A variety of security technologies have been proposed to deal with system security problems including buffer overflow.For example,No eXecute(NX for short)is a memory management technology commonly used in Harvard architecture.It can refuse the execution of code which residing in a specific memory,and can effectively suppress the abnormal impact of buffer overflow on control flow.Therefore,in recent years,it has also been used in the field of system security,deriving a series of solutions based on NX technology,such as ExecShield,DEP,StackGuard,etc.However,these security solutions often rely too much on the processor archi-tecture so that the protection coverage is insufficient and the accuracy is limited.Especially in the emerging system architecture field represented by RiSC-V,there is still a lack of effective solutions for buffer overflow vulnerabilities.With the continuous rapid development of the system architecture,it is urgent to develop defense methods that are applicable to different system application environments and oriented to all executable memory spaces to meet the needs of system security development.Therefore,we propose BOP,A new system memory security design method based on RISC-V extended instructions,to build a RISC-V buffer overflow detection and defense system and deal with the buffer overflow threat in RIsC-V.According to this method,NX technology can be combined with program control flow analysis,and Nx bit mechanism can be used to manage the executability of memory space,so as to achieve a more granular detection and defense of buffer overflow attacks that may occur in RISC-V system environment.In addition,The memory management and control function of BOP is not only very suitable for solving the security problems in the existing single architecture system,but also widely applicable to the combina-tion of multiple heterogeneous systems. 展开更多
关键词 RISc-V Operating system security buffer overflow Control flow hijacking Nx bit Xibop
原文传递
Automatic Buffer Overflow Warning Validation 被引量:1
9
作者 Feng-Juan Gao Yu Wang +2 位作者 Lin-Zhang Wang Zijiang Yang Xuan-Dong Li 《Journal of Computer Science & Technology》 SCIE EI CSCD 2020年第6期1406-1427,共22页
Static buffer overflow detection techniques tend to report too many false positives fundamentally due to the lack of software execution information. It is very time consuming to manually inspect all the static warning... Static buffer overflow detection techniques tend to report too many false positives fundamentally due to the lack of software execution information. It is very time consuming to manually inspect all the static warnings. In this paper, we propose BovInspector, a framework for automatically validating static buffer overflow warnings and providing suggestions for automatic repair of true buffer overflow warnings for C programs. Given the program source code and the static buffer overflow warnings, BovInspector first performs warning reachability analysis. Then, BovInspector executes the source code symbolically under the guidance of reachable warnings. Each reachable warning is validated and classified by checking whether all the path conditions and the buffer overflow constraints can be satisfied simultaneously. For each validated true warning, BovInspector provides suggestions to automatically repair it with 11 repair strategies. BovInspector is complementary to prior static buffer overflow discovery schemes. Experimental results on real open source programs show that BovInspector can automatically validate on average 60% of total warnings reported by static tools. 展开更多
关键词 buffer overflow static analysis warning symbolic execution automatic repair
原文传递
An Buffer Overflow Automatic Detection Method Based on Operation Semantic
10
作者 ZHAO Dong-fan LIU Lei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2005年第3期63-66,共4页
Buffer overflow is the most dangerous attack method that can be exploited. According to the statistics of Computer Emergency Readiness Team ( CERT ), buffer overflow accounts for 50% of the current software vulnerab... Buffer overflow is the most dangerous attack method that can be exploited. According to the statistics of Computer Emergency Readiness Team ( CERT ), buffer overflow accounts for 50% of the current software vulnerabilities, and this ratio is going up. Considering a subset of C language, Mini C, this paper presents an abstract machine model that can realire buffer overflow detection, which is based on operation semantic. Thus the research on buffer overflow detection can be built on strict descriptions of operation semantic. Not only the correctness can be assured, but also the system can be realized and extended easily. 展开更多
关键词 buffer overflow detection abstract machine program analysis
原文传递
基于静态语义流图的漏洞检测模型
11
作者 李春艳 陈世阳 +2 位作者 易仲铁 林周勇 黄突 《计算机应用文摘》 2024年第20期159-161,共3页
随着软件系统的复杂性不断增加和规模的扩大,漏洞检测成为确保软件安全性和稳定性的重要环节,但传统的静态分析方法在应对复杂漏洞时表现出一定的局限性。文章提出了一种基于静态语义流图(Static Semantic Flow Graph,SSFG)的漏洞检测... 随着软件系统的复杂性不断增加和规模的扩大,漏洞检测成为确保软件安全性和稳定性的重要环节,但传统的静态分析方法在应对复杂漏洞时表现出一定的局限性。文章提出了一种基于静态语义流图(Static Semantic Flow Graph,SSFG)的漏洞检测模型。该模型结合了程序的语义信息和数据流分析,通过构建语义流图实现对软件漏洞的精准检测。实验结果表明,该方法在检测常见漏洞类型(如缓冲区溢出与SQL注入等)时具有较高的准确率和较强的有效性。 展开更多
关键词 静态语义流图 漏洞检测 软件漏洞 缓冲区溢出 SQL注入
下载PDF
Effect of Transmission Control Protocol on Limited Buffer Cognitive Radio Relay Node 被引量:1
12
作者 Mohsen M. Tantawy 《Communications and Network》 2015年第3期139-145,共7页
Transmission Control Protocol (TCP) is the most important transport layer protocol being used nowadays. It suffers from many problems over mobile networks especially over Cognitive Radio (CR). CR is one of the latest ... Transmission Control Protocol (TCP) is the most important transport layer protocol being used nowadays. It suffers from many problems over mobile networks especially over Cognitive Radio (CR). CR is one of the latest mobile technologies that brings its own share of problems for TCP. The buffer overflow for CR secondary network relay node can affect the performance of TCP. The contribution of this paper is the novel cross-layer model being used to evaluate the effect of the TCP congestion control on the secondary relay node buffer size in Cognitive Radio Network (CRN). The performance has been assessed by buffer overflow probability. 展开更多
关键词 TCP CONGESTION Control COGNITIVE Radio Networks CROSS-LAYER Design buffer overflow
下载PDF
缓冲区溢出检测技术综述
13
作者 邵思豪 李国良 +1 位作者 朱宸锋 李典恩 《信息安全研究》 CSCD 2023年第12期1180-1189,共10页
近年来随着信息社会软件规模不断扩大,缓冲区溢出漏洞的数目不减反增,亟需对已有缓冲区溢出漏洞检测技术进行脉络梳理、对比分析,以期取得技术创新与突破.针对上述问题,对缓冲区溢出漏洞检测技术进行梳理分析:将缓冲区溢出漏洞静态检测... 近年来随着信息社会软件规模不断扩大,缓冲区溢出漏洞的数目不减反增,亟需对已有缓冲区溢出漏洞检测技术进行脉络梳理、对比分析,以期取得技术创新与突破.针对上述问题,对缓冲区溢出漏洞检测技术进行梳理分析:将缓冲区溢出漏洞静态检测技术划分为特征分类和软件分析方法2类;将缓冲区溢出动态测试技术分为传统模糊测试、智能灰盒测试和输入变量覆盖率转换3类;将缓冲区漏洞运行防护技术划分为完整性防护、机密性防护和可用性防护3类;将自动利用技术划分为导致程序崩溃、劫持程序控制流、劫持程序数据流3类;将自动修复技术划分为单一修复策略和多元修复策略2类.在梳理分析的基础上,提出未来3个可能研究方向:1)优化静态检测技术;2)融合机器学习技术进行检测;3)多技术协同检测. 展开更多
关键词 缓冲区溢出 静态检测 动态测试 运行时防护 自动利用
下载PDF
缓冲净化池和溢流式雨水口在市政道路中的研究与应用
14
作者 方文献 陈伯元 《建筑技术》 2023年第18期2197-2199,共3页
雄安新区某市政道路工程建设时,将缓冲净化池和溢流式雨水口设计在市政道路中非机动车车道隔离带内,每隔40m布置一处,通过研究分析缓冲净化池和溢流式雨水口的排水能力、缓冲效果、净化功能以及具体的应用方法,为同类工程提供借鉴经验。
关键词 缓冲净化池 溢流式雨水口 排水能力 缓冲效果 净化功能
下载PDF
基于多序列联配的攻击特征自动提取技术研究 被引量:25
15
作者 唐勇 卢锡城 +1 位作者 胡华平 朱培栋 《计算机学报》 EI CSCD 北大核心 2006年第9期1533-1541,共9页
误用入侵检测系统的检测能力在很大程度上取决于攻击特征的数量和质量.该文提出一种基于多序列联配的攻击特征自动提取方法:首先将可疑的网络数据流转化为序列加入到可疑数据池中;通过聚类将这些序列分为若干类别;最后利用该文提出的多... 误用入侵检测系统的检测能力在很大程度上取决于攻击特征的数量和质量.该文提出一种基于多序列联配的攻击特征自动提取方法:首先将可疑的网络数据流转化为序列加入到可疑数据池中;通过聚类将这些序列分为若干类别;最后利用该文提出的多序列联配算法对同一类中的序列进行联配,并以产生的结果代表一类攻击的特征.该方法的核心是该文提出的两种序列联配算法:奖励相邻匹配的全局联配算法CMENW(Contiguous-Matches Encouraging Needleman-Wunsch)和层次式多序列联配算法HMSA(Hierarchical Multi-Sequence Align-ment).CMENW算法克服了Needleman-Wunsch算法易产生碎片的问题,使得连续的特征片段能够尽量地予以保留;HMSA算法以层次式策略对多序列进行联配,支持通配符,并带有剪枝功能.该方法可以自动地提取包括变形病毒和缓冲区溢出在内的新攻击的特征,其主要优点是:(1)产生的攻击特征包含位置相关信息,因而相对传统的方法结果更加准确;(2)具有良好的抗噪能力. 展开更多
关键词 攻击特征提取 入侵检测 序列联配 变形蠕虫 缓冲区溢出攻击
下载PDF
缓冲区溢出攻击:原理,防御及检测 被引量:35
16
作者 蒋卫华 李伟华 杜君 《计算机工程》 CAS CSCD 北大核心 2003年第10期5-7,共3页
给出了缓冲区溢出的原理,分析了利用缓冲区溢出漏洞进行网络攻击的方法及其特征;从程序编写、程序检测、数据结构设计以及程序执行控制等多个角度对防止缓冲区溢出攻击进行了分析,提出了遏制利用缓冲区溢出漏洞进行攻击的一些方法。
关键词 缓冲区溢出 堆栈送出 黑客攻击 防御 缓冲区检测 缓冲区不可执行
下载PDF
缓冲区溢出攻击的分析和一种防卫算法RAP 被引量:8
17
作者 刘武 杨路 +1 位作者 任萍 舒航 《计算机应用》 CSCD 北大核心 2003年第1期4-6,共3页
基于缓冲区溢出的攻击是一种常见的安全攻击手段,文中从编程的角度分析了缓冲区溢出攻击(BOFA)、攻击成功的条件及攻击分类,并分析了抵御BOFA的方法。最后给出了一个能有效抵御BOFA的软件RAP的工作原理和算法。
关键词 防卫算法 RAP算法 堆栈 缓冲区 入侵检测 缓冲区溢出攻击 网络信息安全 计算机网络
下载PDF
一种基于代码静态分析的缓冲区溢出检测算法 被引量:15
18
作者 王雅文 姚欣洪 +1 位作者 宫云战 杨朝红 《计算机研究与发展》 EI CSCD 北大核心 2012年第4期839-845,共7页
缓冲区溢出目前已成为最常见的软件安全漏洞之一,从源代码形式来看,常见的缓冲区溢出漏洞主要有两种类型:数据拷贝和格式化字符串造成的缓冲区溢出.分析了常见缓冲区溢出漏洞发生的原因,给出了格式化字符串存储长度的计算方法,介绍了一... 缓冲区溢出目前已成为最常见的软件安全漏洞之一,从源代码形式来看,常见的缓冲区溢出漏洞主要有两种类型:数据拷贝和格式化字符串造成的缓冲区溢出.分析了常见缓冲区溢出漏洞发生的原因,给出了格式化字符串存储长度的计算方法,介绍了一种基于源代码静态分析的缓冲区溢出检测算法,该算法首先对源代码进行建模,构造其抽象语法树、符号表、控制流图、函数调用图,在此基础上运用区间运算技术来分析和计算程序变量及表达式的取值范围,并在函数间分析中引入函数摘要来代替实际的函数调用.最后使用该方法对开源软件项目进行检测,结果表明该方法能够有效地、精确地检测缓冲区溢出. 展开更多
关键词 安全漏洞 缓冲区溢出 静态分析 区间运算 函数摘要
下载PDF
一种基于fuzzing技术的漏洞发掘新思路 被引量:17
19
作者 邵林 张小松 苏恩标 《计算机应用研究》 CSCD 北大核心 2009年第3期1086-1088,共3页
目前检测软件缓冲区溢出漏洞仅局限于手工分析、二进制补丁比较及fuzzing技术等,这些技术要么对人工分析依赖程度高,要么盲目性太大,致使漏洞发掘效率极为低下。结合fuzzing技术、数据流动态分析技术以及异常自动分析技术等,提出一种新... 目前检测软件缓冲区溢出漏洞仅局限于手工分析、二进制补丁比较及fuzzing技术等,这些技术要么对人工分析依赖程度高,要么盲目性太大,致使漏洞发掘效率极为低下。结合fuzzing技术、数据流动态分析技术以及异常自动分析技术等,提出一种新的缓冲区溢出漏洞发掘思路。新思路克服了已有缓冲区溢出漏洞发掘技术的缺点,能有效发掘网络服务器软件中潜在的未知安全漏洞(0day),提高了缓冲区溢出漏洞发掘效率和自动化程度。 展开更多
关键词 自动化 缓冲区溢出 黑盒测试 安全漏洞 漏洞发掘
下载PDF
远程缓冲区溢出攻击的原理分析与检测 被引量:8
20
作者 李娜 陈性元 车天伟 《计算机工程与应用》 CSCD 北大核心 2004年第3期145-147,共3页
基于缓冲区溢出的攻击是目前使用相当普遍的一种黑客技术,该文分析了这种攻击的基本原理,在此基础上提出了利用NDIS开发包进行检测的一般方法,并且用实验证实了这种方法的有效性。
关键词 缓冲区溢出 NDIS 攻击 黑客技术 网络安全 远程控制 计算机网络 检测
下载PDF
上一页 1 2 18 下一页 到第
使用帮助 返回顶部