期刊文献+

基于动态二进制平台的缓冲区溢出过程分析 被引量:2

Process Analysis of Buffer Overflow Based on Dynamic Binary Platform
在线阅读 下载PDF
导出
摘要 提出一种基于动态二进制平台的缓冲区溢出过程分析方法,并实现基于该方法的原型系统。分析缓冲区溢出攻击方法的特点,给出基于异常捕获、控制流分析和内存状态检查的溢出检测方法。通过对内存读写指令、控制转移指令进行监控,获得函数调用序列和数据传递关系,定位导致缓冲区溢出的代码。实验结果表明,该系统能有效检测缓冲区溢出,准确定位导致溢出的代码位置。 This paper proposes an process analysis method for buffer overflow based on dynamic binary platform, and a prototype system based on this method is implemented. According to the principle of buffer overflow attacks, overflow detection method based on exception caught, control flow analysis, and memory status checks is implemented. By monitoring memory read and write, control transfer instructions, system obtains call sequences and data transfer flow. Through analysis of memory data and function calls, orientation code leads to buffer overflow. Experimental results show that the system can detect buffer overflows, and accurate positioning code results in buffer overflow.
出处 《计算机工程》 CAS CSCD 2012年第6期66-68,71,共4页 Computer Engineering
关键词 缓冲区溢出 动态二进制平台 溢出检测 溢出定位 控制流分析 数据流分析 buffer overflow dynamic binary platform overflow detection overflow positioning control flow analysis data flow analysis
作者简介 董鹏程(1985-),男,硕士研究生,主研方向:网络与信息安全 舒辉,副教授、博士 康绯,副教授 王乾,硕士研究生 魏巍,学士
  • 相关文献

参考文献7

  • 1Nethercote N. Dynamic Binary Analysis and Instrumentation[D]. Cambridge, UK: University of Cambridge, 2004.
  • 2Newsome J, Song D. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software[C]//Proc. of the 12th Annual Network and Distributed System Security Symposium. San Diego, USA: [s. n.], 2005.
  • 3Bellard F. QEMU: A Fast and Portable Dynamic Translator[C]// Proc. of ATEC'05. Anaheim, USA: ACM Press, 2005: 41-45.
  • 4Portokalidis G, Slowinska A, Bos H. Argos: An Emulator for Fingerprinting Zero-day Attacks[C]//Proc. of EUROSYS'06. Leuven, Belgium: [s. n.], 2006: 15-28.
  • 5史胜利,任平安.一种缓冲区溢出攻击的实时检测方法[J].计算机工程,2011,37(10):111-113. 被引量:3
  • 6Luk Chi-Keung, Cohn R, Muth R, et al. Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation[C]//Proc. of 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation. New York, USA: ACM Press, 2005: 190-200.
  • 7Bruening D L. Efficient, Transparent, and Comprehensive Runtime Code Manipulation[D]. Cambridge, USA: Massachusetts Institute of Technology, 2004.

二级参考文献4

  • 1Luk C,Cohn R,Muth R.Pin:Building Customized Program Analysis Tools with Dynamic Instrumentation[C] //Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation.Chicago,USA:[s.n] ,2005.
  • 2StackShield V A Stack Smaching Technique Protection Tool for Linux[EB/OL].(2001-10-20).http://www.angelfire.con/sk/ stackshield/infor.htm.
  • 3李毅超,刘丹,韩宏,卢显良.缓冲区溢出漏洞研究与进展[J].计算机科学,2008,35(1):87-89. 被引量:11
  • 4房陈,茅兵,谢立.基于动态染色的内存漏洞定位技术[J].计算机工程,2010,36(7):139-141. 被引量:4

共引文献2

同被引文献8

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部