期刊文献+

基于有限状态自动机的漏洞检测模型 被引量:3

Vulnerability detection model based on finite automata
下载PDF
导出
摘要 漏洞是软件安全的一个严重威胁,如何检测软件中存在的漏洞对提高其安全性具有重要的意义。经过分析缓冲区溢出漏洞产生的原因,得出了其形成的3个必要条件,并根据产生原因的不同,针对函数调用出错和循环拷贝出错而导致的两类缓冲区溢出漏洞,分别提出了相应的基于有限状态自动机的漏洞检测模型。 Vulnerability is a serious menace to software security, so vulnerability detection has important meanings for improving software security. The reasons and conditions of buffer overflow vulnerability are analyzed, then an detection model based on finite automata is presented to detect buffer overflow vulnerabilities which cause by improper function calls and circulatory buffer copy.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第8期1804-1806,共3页 Computer Engineering and Design
关键词 漏洞检测 缓冲区溢出 有限状态自动机 数据拷贝 区间 vulnerability detection buffer overflow finite automata data copy range
  • 相关文献

参考文献8

  • 1CNCCERT/CC.2005年CNCCERT/CC网络安全工作报告[EB/OL].http://www.cert.org.cn/upload/2005CNCERTCCAnnualReport_Chinese.pdf.
  • 2David Larochelle.Statically detecting likely buffer overflow vulnerabilities[Z].Virginia:University of Virginia,2000.
  • 3John Viega.ITS4:A static vulnerability scanner for C and C++code[EB/OL].http://citeseer.ist.psu.edu/viega00its.html.
  • 4Halvar Flake.bugscam[CP/OL].http://sourceforge.net/projects/bugscam.
  • 5Monica S Lam.A practical dynamic buffer overflow detector[Z].Stanford:Computer Systems Laboratory,2004.
  • 6Dave Aitel.The Advantages of Block-Based Protocol Analysis for Security Testing[Z].USA:Immunity,2002.
  • 7David Wagner.A first step towards automated detection of buffer overrun[Z].Berkeley:University of California,2000.
  • 8赵瑞莲.一种基于数据流分析的程序定义域自动确定方法[Z].北京:中国科学院计算技术研究所,2001.

同被引文献22

  • 1CNCert/CC.2005年CNCERT网络安全工作报告[R/OL].(2006-03-07). http://www.cert.org.cn/upload/2005CNCERTCCAnnual Report_Chinese.pdf,
  • 2Evans D, Larchelle D. Improving Security Using Extensible Lightweight Static Anlaysis[J]. IEEE Trans. on Software, 2002, 19(1): 42-51.
  • 3Wagner D, Foster J S, Brewer E A, et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities[C]//Proc. of Network and Distributed System Security Symposium. San Diego, USA: [s. n.], 2000.
  • 4Ganapathy S J. Buffer Overrun Detection Using Linear Programming and Static Analysis[C]//Proc. of Conferenc on Computer and Communication Security. Washington, USA: [s. n.], 2003.
  • 5Flake H B. IDC Package[EB/OL]. (2003-05-17). http://sourceforge. net/projects/bugscam.
  • 6基于数据流分析的静态漏洞挖掘[Z/OL].(2005-08-25).http://www.xfocus.neffprojects/Xcon/2004/Xcon2004-funnywei.pdf.
  • 7Muchnick S S.高级编译器设计与实现[M].北京:机械工业出版社,2003.
  • 8Ramalingam G, Field J, Tip F. Aggregate Structure Identification and Its Application to Program Analysis[J]//Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on POPL. Texas, USA: [s. n.], 1999.
  • 9CNCERT.2011年我国互联网网络安全态势综述[EB/OL].(2012-03-19)[2012-08一01].http://www.cert.org.cn/UserFiles/File/201203192011annualreport(1).pdf.
  • 10Aleph One. Smashing the stack for fun and profit[ EB/OL]. (1996- 08-11 ) [ 2012-08-01 ]. http ://www. phrack, corn/issues, html? is- sue =49&id = 14.

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部