期刊文献+

基于返回地址变换的动态栈缓冲区溢出防御机制

Dynamic Stack Buffer-overflow Prevention Based on Return-address Translation
下载PDF
导出
摘要 根据Intel 80X86体系结构与栈缓冲区溢出的基本特点,从汇编语言程序的视角对缓冲区溢出攻击进行分类,分析了现有的动态防御机制所存在的优缺点,指出现有防御策略所存在的不足.提出一种基于返回地址变换的动态栈缓冲区溢出防御机制,理论分析和实验表明新机制能够极大概率对抗各种缓冲区溢出攻击.该机制能根据所部署系统的安全要求不同采用不同的方案,以满足不同的安全性和不同的效率要求. In the paper,the basic attack patterns for Intel 80X86 are classified in the viewpoint of assemble language programs.The weak-ness of the existing dynamic buffer-overflow prevention mechanisms is discussed.A new dynamic stack buffer-overflow prevention mechanism based on return-address translation is proposed.The new mechanism is proved to be able to defend multiple patterns attacks with an acceptable performance tradeoff.We present experimental results of both the penetration resistance and the performance impact of the propsed mechanism.With simple modification,the mechanism is suitable for different security and performance needs.
出处 《小型微型计算机系统》 CSCD 北大核心 2012年第5期1012-1017,共6页 Journal of Chinese Computer Systems
基金 国家"八六三"高技术研究发展计划项目(2007AA01Z142)资助
关键词 Intel80X86体系结构 汇编语言程序 软件漏洞 栈缓冲区溢出 动态防御 Intel 80X86 architecture assemble language program software vulnerability stack overflow dynamic prevention
  • 相关文献

参考文献25

  • 1Silicon Valley:Intel Corp.Intel architecture software developer'smanual,volume 2:instruction set reference[M].1999:791-833. 被引量:1
  • 2Ham Swap-Linux.Linux SuperProbe vulnerability[EB/OL].ht-tp://www.insecure.org/sploits/linux.SuperProbe.html,March,1997. 被引量:1
  • 3Aleph one.Smashing the stack for fun and profit[J].Phrack,1996,7(49):14. 被引量:1
  • 4Cowan C,Pu C,Maier D,et al.Stack guard:automatic adaptivedetection and prevention of buffer-overflow attacks[C].In:Pro-ceedings of the 7th USENIX Security Symposium,USENIX Asso-ciation,San Antonio,Texas,U.S.A.,Jan.1998:63-78. 被引量:1
  • 5Metasploit Project[EB/OL].http://www.metasploit.com,No-vember,2010. 被引量:1
  • 6Pozza D,Sisto R.A lightweight security analyzer inside GCC[C].In:Proceedings of IEEE Third International Conference onAvailability,Reliability and Security,Barcelona:IEEE ComputerSociety,2008:851-858. 被引量:1
  • 7Shihjong Kuo.Execute disable bit functionality blocks Malware-Code execution[EB/OL].http://developer.intel.com,2005. 被引量:1
  • 8Strackx R,Younan Y,Philippaerts P,et al.Breaking the memorysecrecy assumption[C].Proceedings of the Second EuropeanWorkshop on System Security,Nuremburg:ACM New YorkPress,2009:1-8. 被引量:1
  • 9Cowan C,Beattie S,Johansen J,et al.PointGuard TM:protec-ting pointers from buffer overflow vulnerabilities[C].Proceedings12th USENIX Security Symposium,Washington D C:USENIXAssociation,2003:359-389. 被引量:1
  • 10Bhatkar S,DuVarney D C,Sekar R.Address obfuscation:an effi-cient approach to combat a broad range of memory error exploits[C].In:Proceedings of the 12th Conference on USENIX SecuritySymposium,Washington D C:USENIX Association,2003:8-23. 被引量:1

二级参考文献18

  • 1Forst J C,Osipov V,Bhalla N,et al.Buffer overflow attacks:detect,exploit,prevent[M].Rockland:Syngress Press,2005. 被引量:1
  • 2Bovet D P,Cesati M.深入理解Linux内核[M].3版.陈莉君,张琼声,张宏伟,译.北京:中国电力出版社,2007. 被引量:1
  • 3AlephOne.Smashing stack for fun and profit[EB/OL].(1996-11-08)[2009-06-15].http://phrack.com/issues.html?issue=49&id=14#article. 被引量:1
  • 4Wagner D,Fester J,Brewer E,et al.A first step towards automated detection of buffer overrun vulnerabilities[C] //Proceedings of the Network and Distributed Systems Security Symposium.San Diego:Internet Society,2000:1-14. 被引量:1
  • 5Cowan C,Pu C,Maier D,et al.StackGuard:automatic adaptive detection and prevention of buffer-overflow attacks[C] //Proceedings of the 7th conference on UsENIX Security Symposium.San Antonio:USENIX Association,1998:63-78. 被引量:1
  • 6Bhatkar S,Du Varney D C,Sekar R.Address obfuscation:an efficient approach to combat a board range of memory error exploits[C] //Proceedings of the 12th Conference on USENIX Security Symposium.Washington D C:USENIX Association,2003:8-23. 被引量:1
  • 7Strackx R,Younan Y,Philippaerts P,et al.Breaking the memory secrecy assumption[C] //Proceedings of the Second European Workshop on System Security.Nuremburg:ACM New York Press,2009:1-8. 被引量:1
  • 8Pozza D,Sisto R.A lightweight security analyzer inside GCC[C] //Proceedings of IEEE Third International Conference on Availability,Reliability and Security.Barcelona:IEEE Computer Society,2008:851-858. 被引量:1
  • 9Etoh H.ProPolice:Gcc extension for protecting applications from stack-smashing attacks[EB/OL].(2005-08-22)[2009-06-15].http://www.trl.ibm.com/projects/security/ssp/. 被引量:1
  • 10Chiueh T,Hsu F H.RAD:a compile-time solution to buffer overflow attacks[C] //Proceedings of the International Conference on Distributed Computing Systems.Phoenix:IEEE Computer Society,2001:409-417. 被引量:1

共引文献372

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部