Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack,many protection methods are proposed in recent years. However,most of these existing met...Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack,many protection methods are proposed in recent years. However,most of these existing methods focus on user-level heap overflow detection. Only a few methods are proposed for kernel heap protection. Moreover,all these kernel protection methods need modifying the existing OS kernel so that they may not be adopted in practice. To address this problem,we propose a lightweight virtualization-based solution that can protect the kernel heap buffers allocated for the target kernel modules. The key idea of our approach is to combine the static binary analysis and virtualization technology to trap a memory allocation operation of the target kernel module,and then add one secure canary word to the end of the allocated buffer. After that,a monitor process is launched to check the integrity of the canaries. The evaluations show that our system can detect kernel heap overflow attacks effectively with minimal performance cost.展开更多
Injection and extraction are usually the key systems in circular accelerators.They play important roles in transferring the beam from one stage acceleration to the other or to experimental stations.It is also in the i...Injection and extraction are usually the key systems in circular accelerators.They play important roles in transferring the beam from one stage acceleration to the other or to experimental stations.It is also in the injection and extraction regions where beam losses happen mostly.Due to the tight space and to reduce the perturbation to the circulating orbit,the devices are usually designed to meet special requirements such as compactness,small stray field,fast rise time or fall time,etc.Usual injection and extraction devices include septum magnets,kicker magnets, electrostatic deflectors,slow bump magnets and strippers.In spite of different accelerators and specification for the injection and extraction devices,many techniques are shared in the design and manufacturing.This paper gives a general review on the techniques employed in the major circular accelerators in China.展开更多
基金supported in part by National Natural Science Foundation of China (NSFC) under Grant No.61602035the National Key Research and Development Program of China under Grant No.2016YFB0800700+1 种基金the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information SecurityOpen Found of Key Laboratory of IOT Application Technology of Universities in Yunnan Province under Grant No.2015IOT03
文摘Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack,many protection methods are proposed in recent years. However,most of these existing methods focus on user-level heap overflow detection. Only a few methods are proposed for kernel heap protection. Moreover,all these kernel protection methods need modifying the existing OS kernel so that they may not be adopted in practice. To address this problem,we propose a lightweight virtualization-based solution that can protect the kernel heap buffers allocated for the target kernel modules. The key idea of our approach is to combine the static binary analysis and virtualization technology to trap a memory allocation operation of the target kernel module,and then add one secure canary word to the end of the allocated buffer. After that,a monitor process is launched to check the integrity of the canaries. The evaluations show that our system can detect kernel heap overflow attacks effectively with minimal performance cost.
文摘Injection and extraction are usually the key systems in circular accelerators.They play important roles in transferring the beam from one stage acceleration to the other or to experimental stations.It is also in the injection and extraction regions where beam losses happen mostly.Due to the tight space and to reduce the perturbation to the circulating orbit,the devices are usually designed to meet special requirements such as compactness,small stray field,fast rise time or fall time,etc.Usual injection and extraction devices include septum magnets,kicker magnets, electrostatic deflectors,slow bump magnets and strippers.In spite of different accelerators and specification for the injection and extraction devices,many techniques are shared in the design and manufacturing.This paper gives a general review on the techniques employed in the major circular accelerators in China.