期刊文献+

一种防止堆栈溢出攻击的新方法 被引量:2

A New Method of Anti-Stack Overflow
下载PDF
导出
摘要 针对现有的用增强编译器来消除堆栈溢出的常用方法StackGuard在实际使用中表现出的不足,基于随机数技术及结合另一种增强编译器的方法StackShield部分思想提出了一种防止堆栈溢出攻击的新方法。此方法对系统性能影响较小,并可以有效地保证堆栈中重要数据的完整性,阻止攻击者利用程序中存在的堆栈溢出漏洞。 Aiming at the deficiency of common method StackGuard which avoids stack overflow by improving compiler we putforword a new method of antistack overflow based on random technology and StackShield method, which another improving compiler method. This technique has little influnce on system performance and can keep the integrality of the stack effectively. So it can prevent the attacker from utilizing the stack overflow.
出处 《现代电子技术》 2007年第5期77-79,共3页 Modern Electronics Technique
基金 湖北省自然科学基金(2005ABA238)资助
关键词 堆栈溢出 StackGuard StackShield 增强编译器 stack overflow StackGuard StackShield improving compiler
  • 相关文献

参考文献8

  • 1Benjamin A Kuperman, Carla E Brodley, Hilmi Ozdoganoglu,et al. Detection and Prevention of Stack Buffer Overflow Attacks [C]. In: Communications of the ACM, 2005, 48(11):50-56. 被引量:1
  • 2Sandeep Juneja,Victor Nicola. Efficient Simulation of Buffer Overflow Probabilities in Jackson Networks with Feedback[C]. In: ACM Transactions on Modeling and Computer Simulation, 2005,15(4) : 281 - 315. 被引量:1
  • 3Wagner D,Soto P. Mimicry Attacks on Host- based Intrusion Detection Systems[C]. In:ACM Conference on Computer and Communications Security,2002. 被引量:1
  • 4Sekar R,Bendre M,Bollineni P,et al. A Fast Automatonbased Method for Detecting Anomalous Program Behaviors [C]. In t IEEE Symposium on Security and Privacy, Oakland, CA, 2001. 被引量:1
  • 5Wagner D, Dean D. Intrusion Detection via Static Analysis[J]. In:IEEE Symposium on Security and Privacy, Oakland,CA,2001:156 - 169 被引量:1
  • 6Chien E, Szoer P. Blended Attacks Exploits, Vulnerabilities and Buffer--overflow Techniques in Computer Viruses[C]. Proceedings of Virus Bulletin Conference,Louisiana, 2002. 被引量:1
  • 7Crispin Cowan, Steve Beattie, Ryan Finnin Day,et al. Protecting ,Systems from Stack Smashing Attacks with Stack- Guard. http://www, immunix, org/documentation, html. 被引量:1
  • 8富宇,唐国维,刘显德.缓冲区溢出的预防与检测技术综述[J].计算机工程与应用,2005,41(32):149-152. 被引量:2

二级参考文献26

  • 1Kyung suk Lhee,Steve J Chapin.Type-assisted dynamic buffer overflow detection[C].In: Proc USENIX Security Symposium, 2002 : 81 -88. 被引量:1
  • 2Kumar Avijit,Prateek Gupta,Deepak Gupta.TIED,LibsafePlus:Tools for Runtime Buffer Overflow Protection.http:// www.cse.iitk.ac.irdusers/ avijitk/documents/tied-libsafeplus.pdf, 2004. 被引量:1
  • 3Crispin Cowan, Steve Beattie, John Johansen et al.Pointguard : Protecting pointers from buffer overflow vulnerabilities[C].In:Proc USENIX Security Symposium, 2003. 被引量:1
  • 4Arash Baratloo, Navjot Singh, Timothy Tsai.Transparent Run-Time Defense Against Stack Smashing Attacks[C].In:Pmceedings of 2000 USENIX Annual Technical Conference San Diego,California,USA, 2000. 被引量:1
  • 5D Wagner,D Dean.Intrusion Detection via Static Analysis[J].IEEE Symposium on Security and Privacy,Oakland,CA,2001:156-169. 被引量:1
  • 6D Wagner,P Soto.Mimicry Attacks on Host-Based Intrusion Detection Systems[C].In:ACM Conference on Computer and Communications Security, 2002. 被引量:1
  • 7R Sekar,M Bendre,P Bollineni et al.A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors[C].In:IEEE Symposium on Security and Privacy,Oakland,CA,2001. 被引量:1
  • 8Henry Hanping Feng,Oleg M Kolesnikov,Prahlad Fogla et al. Anomaly Detection Using Call Stack Information.http://www-unix.ecs. umass.edu/~gong/papers/ok_idpc.pdf, 2003. 被引量:1
  • 9Mark Foster,Joseph N Wilson,Shigang Chen.Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks.http://www.cise. ufl.edu/~sgcherd papers/GHCP%20Paper%20Final.pdf, 2004. 被引量:1
  • 10Lap chung Lam,Tzi cker Chiueh.Automatic Extraction of Accurate Sandboxing Policy.http ://www.blackhat.com/presentations/bh-usa-04/ bh-us-04-chiueh/ bh-us-04-chiueh-whitepaper.pdf, 2004. 被引量:1

共引文献1

  • 1硬件[J].电脑知识与技术(经验技巧),2007(5):93-93.

同被引文献6

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部