期刊文献+

基于中间汇编的缓冲区溢出检测模型 被引量:6

Buffer Overflow Detection Model Based on Intermedia Assembly
下载PDF
导出
摘要 提出一种基于中间汇编的缓冲区溢出检测模型,用于对可执行代码进行静态分析和检测。采用中间汇编形式可以使算法对硬件平台透明,增强代码可阅读性,有利于对缓冲区溢出的检测。针对不安全函数调用和写内存循环2种字符串拷贝操作,研究写内存循环导致的溢出问题,提出一种流相关、上下文无关的检测算法。 This paper presents a buffer overflow detection model based on interrnedia assembly which can be used to perform static analysis and detection on executable files. The algorithm is transparent to hardware platforms, the code is better readable, and buffer overflow is easy to detect. For the 2 string copying operations, i.e. insecure function invokes and copying memory loops, it researches buffer overflow caused by the later and present a flow sensitive and context-insensitive algorithm to detect it.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第3期169-172,共4页 Computer Engineering
关键词 缓冲区溢出 中间汇编 不安全函数 buffer overflow intermedia assembly insecure functions
  • 相关文献

参考文献9

  • 1CNCert/CC.2005年CNCERT网络安全工作报告[R/OL].(2006-03-07). http://www.cert.org.cn/upload/2005CNCERTCCAnnual Report_Chinese.pdf,
  • 2Evans D, Larchelle D. Improving Security Using Extensible Lightweight Static Anlaysis[J]. IEEE Trans. on Software, 2002, 19(1): 42-51.
  • 3Wagner D, Foster J S, Brewer E A, et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities[C]//Proc. of Network and Distributed System Security Symposium. San Diego, USA: [s. n.], 2000.
  • 4Ganapathy S J. Buffer Overrun Detection Using Linear Programming and Static Analysis[C]//Proc. of Conferenc on Computer and Communication Security. Washington, USA: [s. n.], 2003.
  • 5Flake H B. IDC Package[EB/OL]. (2003-05-17). http://sourceforge. net/projects/bugscam.
  • 6基于数据流分析的静态漏洞挖掘[Z/OL].(2005-08-25).http://www.xfocus.neffprojects/Xcon/2004/Xcon2004-funnywei.pdf.
  • 7胡定文,朱俊虎,吴灏.基于有限状态自动机的漏洞检测模型[J].计算机工程与设计,2007,28(8):1804-1806. 被引量:3
  • 8Muchnick S S.高级编译器设计与实现[M].北京:机械工业出版社,2003.
  • 9Ramalingam G, Field J, Tip F. Aggregate Structure Identification and Its Application to Program Analysis[J]//Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on POPL. Texas, USA: [s. n.], 1999.

二级参考文献8

  • 1Monica S Lam.A practical dynamic buffer overflow detector[Z].Stanford:Computer Systems Laboratory,2004.
  • 2Dave Aitel.The Advantages of Block-Based Protocol Analysis for Security Testing[Z].USA:Immunity,2002.
  • 3David Wagner.A first step towards automated detection of buffer overrun[Z].Berkeley:University of California,2000.
  • 4赵瑞莲.一种基于数据流分析的程序定义域自动确定方法[Z].北京:中国科学院计算技术研究所,2001.
  • 5CNCCERT/CC.2005年CNCCERT/CC网络安全工作报告[EB/OL].http://www.cert.org.cn/upload/2005CNCERTCCAnnualReport_Chinese.pdf.
  • 6David Larochelle.Statically detecting likely buffer overflow vulnerabilities[Z].Virginia:University of Virginia,2000.
  • 7John Viega.ITS4:A static vulnerability scanner for C and C++code[EB/OL].http://citeseer.ist.psu.edu/viega00its.html.
  • 8Halvar Flake.bugscam[CP/OL].http://sourceforge.net/projects/bugscam.

共引文献2

同被引文献49

引证文献6

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部