期刊文献+

缓冲区溢出攻击的自动化检测方法 被引量:1

A Method of Automated Detection of Buffer Overflow Attacks
下载PDF
导出
摘要 基于动态二进制平台DynamoRIO,研究了面向二进制代码的缓冲区溢出攻击样本的自动化检测方法.该方法利用动态二进制平台的插桩技术,针对不同的溢出覆盖类型,通过异常捕获、控制流分析和内存状态检查实现了对缓冲区溢出的自动化检测.实验结果表明,该方法能够自动化地、准确地检测出样本中存在的缓冲区溢出攻击,在缓冲区溢出攻击的自动化检测方面具有较好的应用价值. 基于动态二进制平台DynamoRIO,研究了面向二进制代码的缓冲区溢出攻击样本的自动化检测方法.该方法利用动态二进制平台的插桩技术,针对不同的溢出覆盖类型,通过异常捕获、控制流分析和内存状态检查实现了对缓冲区溢出的自动化检测.实验结果表明,该方法能够自动化地、准确地检测出样本中存在的缓冲区溢出攻击,在缓冲区溢出攻击的自动化检测方面具有较好的应用价值.
出处 《计算机研究与发展》 EI CSCD 北大核心 2012年第S2期32-38,共7页 Journal of Computer Research and Development
关键词 缓冲区溢出 DynamoRIO 动态二进制平台 插桩技术 漏洞分析 buffer overflow DynamoRIO dynamic binary platform instrumentation technology vulnerability analysis
  • 相关文献

参考文献7

  • 1Julian Seward,Nicholas Nethercote.Using Valgrind to detect undefined value errors with bit-precision. Proceedings of the USENIX Annual Technical Conference 2005 on USENIX Annual Technical Conference . 2005 被引量:1
  • 2Newsome J,Song D.Dynamic Taint analysis:Automaticdetection,analysis,and signature generation of exploitattacks on commodity software. Proceedings of 12thAnnual Network and Distributed System Security Symposium(NDSS’’05) . 2005 被引量:1
  • 3DEREK B.Efficient,transparent,and comprehensive runtime codemanipulation. . 2004 被引量:1
  • 4Nicholas N.Dynamic binary analysis and instrumentation. . 2004 被引量:1
  • 5Portokalidis G,Slowinska A.Argos:An Emulator for Fingerprinting Zero-Day Attacks. Proc of the ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys’’06) . 2006 被引量:1
  • 6Wang Chunlei,Yan Wen,Dai Yiqi.A software vulnerability analysis environment based on virtualization technology. Proc of 2010IEEE Int Conf on Wireless Communications,Networking and Information Security (WCNIS 2010) . 2010 被引量:1
  • 7Zimmer D.Pdf Stream Dumper. http://sandsprite.com/blogs/index.php/uid=7&pid=57 . 2004 被引量:1

同被引文献9

  • 1Sikorski M,Honig A.Practical malware analysis:the hands-on guide to dissecting malicious software[M].诸葛建伟,王珩,孙松柏,译.北京:电子工业出版社,2012. 被引量:1
  • 2Polychronakis M,Anagnostakis K,Markatos E.Network-level polymorphic shellcode detection using emulation[C]//Proc of the 3rd Internation Conference on Detection of Intrusions and Malware & Vulnerability Assessment.Berlin:Springer,2006:54-73. 被引量:1
  • 3Zhang Qinghua,Reeves D S,Ning P,et al.Analyzing network traffic to detect self-decrypting exploit code[C]//Proc of ACM Symposium on Information,Computer and Communications Security.New York:ACM Press,2007:4-12. 被引量:1
  • 4Polychronakis M,Anagnostakis K,Markatos E.Comprehensive shellcode detection using runtime heuristics[C]//Proc of the 26th Annual Computer Security Applications Conference.2010:287-296. 被引量:1
  • 5Polychronakis M,Anagnostakis K,Markatos E.Emulation-based detection of non-self-contained polymorphic shellcode[C]//Proc of the 10th International Symposium on Recent Advances in Intrusion Detection.2007:87-106. 被引量:1
  • 6Kennedy D,O’Gorman J,Kearns D,et al.Metasploit:the penetration tester’s guide:a penetration tester’s guide[M].诸葛建伟,姜辉,张光凯,译.北京:电子工业出版社,2014. 被引量:1
  • 7Khodaverdi J.Enhancing the effectiveness of shellcode detection by new run-time heuristics[J].International Journal of Computer Science Research and Application,2013,3(2):2-11. 被引量:1
  • 8王兰佳,段海新,李星.基于动态模拟的多态Shellcode建模与网络层检测[J].中国科学(E辑),2008,38(10):1760-1773. 被引量:3
  • 9王雅文,姚欣洪,宫云战,杨朝红.一种基于代码静态分析的缓冲区溢出检测算法[J].计算机研究与发展,2012,49(4):839-845. 被引量:15

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部