期刊文献+

Windows Vista内存保护关键技术研究 被引量:9

Research of the Key Technology for the Windows Vista Memory Protection Mechanism
下载PDF
导出
摘要 ASLR、SafeSEH和GS Stack Protection技术是Windows Vista内存保护机制的关键技术,本文以对这三种技术的原理分析为基础,研究它在一般和特定缓冲区溢出攻击条件下的反应,证明其在功能上存在的不足,并提出改进方案,提高了内存保护机制的实用性和可靠性。最后,本文对三种技术的关联与互补做了讨论。 ASLR, SafeSEH and GS Stack Protection are there key technologies for the memory protection mechanism of Windows Vista. Based on the analysis of these technologies,we study their reactions on both general and particular condi- tions, prove the vulnerability in their functions, and then improve these methods,which enhance the practicability and relia- bility of the memory protection mechanism. In addition,we discuss the relationships between the three technologies.
作者 彭建山 吴灏
出处 《计算机工程与科学》 CSCD 2007年第12期33-36,共4页 Computer Engineering & Science
关键词 ASLR SafeSEH GS 异常处理 缓冲区溢出 ASLR SafeSEH GS exception handling buffer overflow
  • 相关文献

参考文献7

  • 1Nergal. The Advanced Return-into-Lib (c) Exploits[M]. Phrack, 2001. 被引量:1
  • 2Whitehouse O, An Analysis of Address Space Layout Randomization on Windows Vista['M]. Symantec, 2007. 被引量:1
  • 3Nagy B. SEH (Structured Exception Handling) Security Changes in XP SP2 and 2003 SP1[Z]. eEye Digital Security, 2006. 被引量:1
  • 4Whitehouse O. Analysis of GS Protections in Windows Vista [M]. Syrnantec, 2007. 被引量:1
  • 5Microsoft. Run-Time Library Reference - __Security_init_Cookie[EB/OL]. http://msdn2. microsoft. com/en-us/library/ms235362(VS.80). aspx,2007-01. 被引量:1
  • 6Anonymous. Once upon a Free[M]. Phraek, 2001. 被引量:1
  • 7Kaempf M. Vudo Malloc Tricks[M]. Phrack, 2001. 被引量:1

同被引文献69

  • 1齐雷,谢余强,程东年,舒辉.Win32 SEH异常处理机制分析[J].信息工程大学学报,2004,5(2):49-52. 被引量:3
  • 2蒋涛.缓冲区溢出原理及防护[J].计算机安全,2005(6):56-59. 被引量:6
  • 3夏一民,罗军,张民选.基于静态分析的安全漏洞检测技术研究[J].计算机科学,2006,33(10):279-282. 被引量:29
  • 4Cowan C,Pu C,Maier D,et al.Stackguard:Automatic Detection and Prevention of Buffer-overrun Attacks[C] //Proc.of the 7th USENIX Security Symposium.San Antonio,Texas,USA:[s.n.] ,1998. 被引量:1
  • 5Ashcraft K,Engler D.Using Programmer-written Compiler Extensions to Catch Security Holes[C] //Proc.of IEEE Symposium on Security and Privacy.[S.1.] :IEEE Press,2002:143-159. 被引量:1
  • 6Chiueh T,Hsu F H.RAD:A Compile-time Solution to Buffer Overflow Attacks[C] //Proc.of the 21st IEEE International Conference on Distributed Computing Systems.[S.1.] :IEEE Press,2001. 被引量:1
  • 7Feng H H,Kolesnikov O M,Fogla P,et al.Anomaly Detection Using Call Stack Information[C] //Proc.of IEEE Symposium on Security and Privacy.[S.1.] :IEEE Press,2003:62-75. 被引量:1
  • 8Wagner D,Dean R.Intrusion Detection via Static Analysis[C] //Proc.of IEEE Symposium on Security and Privacy.[S.1.] :IEEE Press,2001:156-168. 被引量:1
  • 9Stojanovski N,Gligoroski D,Knapskog Svein J,et al.Bypassing Data Execution Prevention on Microsoft Windows XP SP2[C] //Proc.of the 2nd International Conference on Availability,Reliability and Security.[S.1.] :IEEE Press,2007:10-13. 被引量:1
  • 10王清.Oday安全软件漏洞分析技术[M].北京:电子工业出版社,2008. 被引量:1

引证文献9

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部