首页 | 本学科首页   官方微博 | 高级检索  
     检索      

缓冲区溢出攻击的动态检测与防范
引用本文:张楠,张建华,傅春常,李建阳.缓冲区溢出攻击的动态检测与防范[J].西南民族学院学报(自然科学版),2007,33(5):1172-1174.
作者姓名:张楠  张建华  傅春常  李建阳
作者单位:西南民族大学计算机科学与技术学院 成都610041
摘    要:缓冲区溢出是被黑客利用得最多的漏洞之一,为了对其进行动态的检测及防范,提出了一种基于地址认证的缓冲区防护(Authentication-Guard)技术.该技术通过修改编译代码,动态检测缓冲区是否发生溢出,对返回地址进行保护,避免了恶意代码的运行.利用该技术,攻击者无法利用计算缓冲区长度来绕开检测,同时也避免了返回地址不可预知的问题.

关 键 词:缓冲区溢出  编译器  地址认证码  返回地址
文章编号:1003-2843(2007)05-1172-03
收稿时间:2007-03-31
修稿时间:2007年3月31日

Dynamic detection and prevention of buffer overflow attacks
ZHANG Nan,ZHANG Jian-hua,FU Chun-chang,LI Jian-yang.Dynamic detection and prevention of buffer overflow attacks[J].Journal of Southwest Nationalities College(Natural Science Edition),2007,33(5):1172-1174.
Authors:ZHANG Nan  ZHANG Jian-hua  FU Chun-chang  LI Jian-yang
Abstract:Buffer overflow is one of the holes that are usually used by hackers.In order to dynamically detect and prevent it,an authentication guard technique is brought forward.The compile code is modified to judge whether the buffer overflows is happens,and prevent the hacker's program running.While this technique is used,the attacker can not steer clear of detection by counting the length of the buffer.At the same tine,this technique solves the problem that the return address is unknown.
Keywords:buffer overflow  compiler  AAC  return address
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号