期刊文献+

基于二进制代码的缓冲区溢出检测研究 被引量:5

Analysis of Buffer Overflow in Binary Files
下载PDF
导出
摘要 随着Internet应用的广泛深入,计算机系统的安全问题日益引起人们的重视,其中,缓冲区溢出漏洞攻击的数量呈逐年上升之势。该文从缓冲区溢出的原理开始,描述了一种利用静态分析和动态分析相结合的基于二进制代码的缓冲区溢出分析检测技术及工具,比较和分析了该工具检测二进制代码的结果与传统工具检测对应源程序的结果,并提出了存在的不足和改进之处。 With Internet goes further, people pay more and more attention to computer security problems. And among them, the number of buffer overflow attacks is growing by year. This article begins with the theory of buffer overflow attacks, describes a method and a tool using static analysis and dynamic analysis to detect buffer overflow in binary files, compares and analyses the result of running this tool and traditional buffer overflow detect tool and indicates the defects of the tool and how to improve it.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第18期141-143,共3页 Computer Engineering
关键词 缓冲区 缓冲区溢出 静态分析 动态分析 Buffer Buffer overflow Static analysis Dynamic analysis
  • 相关文献

参考文献5

  • 1Wagner D,Foster J,Brewer E,et al.A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities[C].Proc.of Symposium on Network and Distributed Systems Security,San Diego,CA,2000-02:3-17. 被引量:1
  • 2Dor N,Rodeh M,Sagiv M.Cleanness Checking of String Manipulations in C Programs via Integer Analysis[C].Proceedings of the 8th International Static Analysis Symposium,2001-06. 被引量:1
  • 3Cowan C,Wagle P,Pu C.Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decade[C].Proceedings of the DARPA Information Survivability Conference and Expo,1999. 被引量:1
  • 4Haugh E.Testing C Programs for Buffer Overflow Vulnerabilities[D].University of California at Davis,2002. 被引量:1
  • 5Wong P.A Watermark for Image Integrity and Ownership Verification[C].Proceedings of the IS & T PICS' 99,1999:374-379. 被引量:1

同被引文献24

引证文献5

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部