期刊文献+

堆栈溢出的BLP形式化研究及实现

BLP formalization study and implementation on buffer overflow
在线阅读 下载PDF
导出
摘要 堆栈溢出是一种在各种操作系统、应用软件中广泛存在普遍且危险的漏洞,可以利用它执行非授权指令,甚至可以取得系统特权,进而进行各种非法操作。从安全操作系统的角度分析了堆栈溢出的原理,以BLP模型为工具对堆栈溢出进行了形式化并在此基础上适当调整了该模型,从安全模型的层次上消除了堆栈溢出的隐患。最后给出了调整后的BLP模型在LSM(Linux security module)上的实现。 Buffer overflow is a kind of leak existed in many OS and software, It is used to execute harmful instruction, furthermore system privilege is stealed or do some nonlicet operation. The mechanism of buffer overflow from the point of view of security operating system is analyzed, buffer overflow with BLP model is formalized. Based on it, the BLP model is adjusted properly and the crisis of buffer overflow is removed on the level of security model. Finally, the adjusted BLP model on LSM is implemented (Linux security module).
出处 《计算机工程与设计》 CSCD 北大核心 2007年第4期808-810,共3页 Computer Engineering and Design
关键词 安全操作系统 堆栈溢出 形式化 BLP模型 LINUX安全模块 security operating system buffer overflow formalization BLP model Linux security module
  • 相关文献

参考文献8

二级参考文献109

  • 1[2]McLEAN J.Security models[A].In:Encyclopedia of Software Engineering [C].New York:Wiley &Sons,1994.
  • 2[3]BELL D,LAPADULA L.Secure computer system:unified exposition and MULTICS interpretation[R].Bedford:MTR-2997 Rev 1,The MITRE Corporation,1976.
  • 3[3]IEEE Draft P1003. 1e/2c IEEE Standard Department,1997
  • 4[4]Grunbacher A. Posix Access Control Lists on Linux,SuSE Labs,linux AG
  • 5[6]Gildfind A. Access Control lists and Extended attributes on linux,SGI
  • 6[7]Final evaluation report. Trusted Xenix v3. 0, National Computer Security center
  • 7[8]Morris J,et al. Linux Security Modules: General Security Support for the Linux Kernel. http:∥www. intercode. com. au/jamesm/lsm-usenix-html/lsm-html. html, 2002
  • 8Kühnhauser W E. On Paradigms for User-Defined Security Policies in Multipolicy Environments. In:11th IFIP Intl. Information Security Conf. , Cape Town, 1995
  • 9Kühnhauser W E. A Paradigm for User-Defined Security Policies. In: 14thIEEE Symposium on Reliable Distributed Systems.Bad Neuenahr, IEEE Press, 1995
  • 10Hosmer H H. Metapolicies II. In:Proc. of the 15th National Computer Security Conf. NIST-NCSC, United States Government Printing Office, 1992. 369~378

共引文献84

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部