期刊文献+

CoSy C语言编译器程序缓冲区溢出研究 被引量:1

Research on Procedure Buffer Overflow of a CoSy C Compiler
在线阅读 下载PDF
导出
摘要 CoSy是ACE公司开发的编译器构架,为了保证CoSy C编译器输入程序的安全性,避免产生编译器缓冲区溢出问题,提出了编译器缓冲区溢出判断模型。根据C源程序编译器缓冲区溢出漏洞的特征,建立了编译器缓冲区溢出判断模型;给出了重建CoSy中间表示CCMIR(Common CoSy Medium-level Intermediate Representation)的方法;最后,给出了CC-MIR程序安全性判定算法。实验结果表明,这种模型可以有效地判断输入程序的安全性。因此,通过重建CCMIR模型可以有效地避免CoSy C语言编译器编译过程中的缓冲区溢出问题。 CoSy is a compiler framework developed by ACE company. In order to ensure the security of inputted procedure of CoSy C compiler and avoiding the crisis of compiler's buffer overflow, model of estimating compiler's buffer overflow was put forward. According to analyzing the character of potential compiler's buffer overflow vuInerabilities in C procedure, and the model of estimating compiler 's buffer overflow was founded; A method of rebuilding common CoSy medium-level intermediate representation was put forward; At last, an algorithm of estimating the security of a CCMIR procedure was put forward. It is indicated that the research can satisfactorily validate the security of the inputted procedure. And this rebuilded CCMIR model can effectively avoid the CoSy C language compiler's buffer overflow.
出处 《计算机技术与发展》 2012年第6期93-96,共4页 Computer Technology and Development
基金 中央高校基本科研业务费专项资金(GK201002011)
关键词 中间表示 COSY 缓冲区溢出 XML intermediate representation CoSy buffer overflow XML
  • 相关文献

参考文献12

二级参考文献44

  • 1郑燕飞,李晖,陈克非.Buffer Overflow Detection on Binary Code[J].Journal of Shanghai Jiaotong university(Science),2006,11(2):224-229. 被引量:2
  • 2叶永青,李晖,郑燕飞,洪璇,郑东.基于二进制代码的缓冲区溢出检测研究[J].计算机工程,2006,32(18):141-143. 被引量:5
  • 3胡定文,朱俊虎,吴灏.基于有限状态自动机的漏洞检测模型[J].计算机工程与设计,2007,28(8):1804-1806. 被引量:3
  • 4CNCert/CC.2005年CNCERT网络安全工作报告[R/OL].(2006-03-07). http://www.cert.org.cn/upload/2005CNCERTCCAnnual Report_Chinese.pdf,
  • 5Evans D, Larchelle D. Improving Security Using Extensible Lightweight Static Anlaysis[J]. IEEE Trans. on Software, 2002, 19(1): 42-51.
  • 6Wagner D, Foster J S, Brewer E A, et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities[C]//Proc. of Network and Distributed System Security Symposium. San Diego, USA: [s. n.], 2000.
  • 7Ganapathy S J. Buffer Overrun Detection Using Linear Programming and Static Analysis[C]//Proc. of Conferenc on Computer and Communication Security. Washington, USA: [s. n.], 2003.
  • 8Flake H B. IDC Package[EB/OL]. (2003-05-17). http://sourceforge. net/projects/bugscam.
  • 9基于数据流分析的静态漏洞挖掘[Z/OL].(2005-08-25).http://www.xfocus.neffprojects/Xcon/2004/Xcon2004-funnywei.pdf.
  • 10Muchnick S S.高级编译器设计与实现[M].北京:机械工业出版社,2003.

共引文献52

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部