曾经有个朋友问我:“为什么在短短几年间出现了这么多黑客?“,我记得当时给他的答复是:“可能是因为网络在进步,也可能是因为Windows操作系统”。如今,Windows又给我们送来了一个可爱的漏洞-Microsofl Internet Explorer双反斜线CH...曾经有个朋友问我:“为什么在短短几年间出现了这么多黑客?“,我记得当时给他的答复是:“可能是因为网络在进步,也可能是因为Windows操作系统”。如今,Windows又给我们送来了一个可爱的漏洞-Microsofl Internet Explorer双反斜线CHM文件执行漏洞。想必大家也猜到了,下面我要教大家的就是如何利用CHM文件执行漏洞,制作CHM木马网页。展开更多
Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Int...Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Integer Checking via Buffer overflow). Our approach includes decompile execute file to assembly language; debug the execute file step into and step out; locate the overflow points and checking buffer overflow caused by integer overflow. We have implemented our approach in three buffer overflow types: format string overflow, stack overflow and heap overflow. Experiments results show that our approach is effective and efficient. We have detected more than 5 known integer overflow vulnerabilities via buffer overflow.展开更多
文摘曾经有个朋友问我:“为什么在短短几年间出现了这么多黑客?“,我记得当时给他的答复是:“可能是因为网络在进步,也可能是因为Windows操作系统”。如今,Windows又给我们送来了一个可爱的漏洞-Microsofl Internet Explorer双反斜线CHM文件执行漏洞。想必大家也猜到了,下面我要教大家的就是如何利用CHM文件执行漏洞,制作CHM木马网页。
基金Supported by the National Natural Science Foundation of China (60903188), Shanghai Education Commission Innovation Foundation (11YZ192) and World Expo Science and Technology Special Fund of Shanghai Science and Technology Commission (08dz0580202).
文摘Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Integer Checking via Buffer overflow). Our approach includes decompile execute file to assembly language; debug the execute file step into and step out; locate the overflow points and checking buffer overflow caused by integer overflow. We have implemented our approach in three buffer overflow types: format string overflow, stack overflow and heap overflow. Experiments results show that our approach is effective and efficient. We have detected more than 5 known integer overflow vulnerabilities via buffer overflow.