期刊文献+
共找到344篇文章
< 1 2 18 >
每页显示 20 50 100
Method of integer overflow detection to avoid buffer overflow 被引量:3
1
作者 张实睿 许蕾 徐宝文 《Journal of Southeast University(English Edition)》 EI CAS 2009年第2期219-223,共5页
A simplified integer overflow detection method based on path relaxation is described for avoiding buffer overflow triggered by integer overflow. When the integer overflow refers to the size of the buffer allocated dyn... A simplified integer overflow detection method based on path relaxation is described for avoiding buffer overflow triggered by integer overflow. When the integer overflow refers to the size of the buffer allocated dynamically, this kind of integer overflow is most likely to trigger buffer overflow. Based on this discovery, through lightly static program analysis, the solution traces the key variables referring to the size of a buffer allocated dynamically and it maintains the upper bound and lower bound of these variables. After the constraint information of these traced variables is inserted into the original program, this method tests the program with test cases through path relaxation, which means that it not only reports the errors revealed by the current runtime value of traced variables contained in the test case, but it also examines the errors possibly occurring under the same execution path with all the possible values of the traced variables. The effectiveness of this method is demonstrated in a case study. Compared with the traditional buffer overflow detection methods, this method reduces the burden of detection and improves efficiency. 展开更多
关键词 integer overflow buffer overflow path relaxation
在线阅读 下载PDF
Buffer Overflow Detection on Binary Code 被引量:2
2
作者 郑燕飞 李晖 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期224-229,共6页
Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically th... Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically the potential buffer overflow vulnerabilities in the binary code of software. The binary code was translated into assembly code without the lose of the information of string operation functions. The feature code abstract graph was constructed to generate more accurate constraint statements, and analyze the assembly code using the method of integer range constraint. After getting the elementary report on suspicious code where buffer overflows possibly happen, the control flow sensitive analysis using program dependence graph was done to decrease the rate of false positive. A prototype was implemented which demonstrates the feasibility and efficiency of the new approach. 展开更多
关键词 binary code buffer overflow integer range constraint feature abstract graph
在线阅读 下载PDF
Method of Preventing Buffer Overflow Attacks by Intercepting DLL Functions
3
作者 谭毓安 曹元大 《Journal of Beijing Institute of Technology》 EI CAS 2005年第3期255-259,共5页
The way of intercepting Windows DLL functions against buffer overflow attacks is evaluated. It's produced at the expense of hooking vulnerable DLL functions by addition of check code. If the return address in the sta... The way of intercepting Windows DLL functions against buffer overflow attacks is evaluated. It's produced at the expense of hooking vulnerable DLL functions by addition of check code. If the return address in the stack belongs to a heap or stack page, the call is from illicit code and the program is terminated. The signature of malicious code is recorded, so it is possible for the next attack to be filtered out. The return-into-libc attacks are detected by comparing the entry address of DLL functions with the overwritten return address in the stack. The presented method interrupts the execution of malicious code and prevents the system from being hijacked when these intercepted DLL functions are invoked in the context of buffer overflow. 展开更多
关键词 buffer overflow vulnerability defenses network security
在线阅读 下载PDF
RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow
4
作者 Wang Yong Gu Dawu +2 位作者 Xu Jianping Wen Mi Deng Liwen 《China Communications》 SCIE CSCD 2010年第6期10-16,共7页
Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Int... Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Integer Checking via Buffer overflow). Our approach includes decompile execute file to assembly language; debug the execute file step into and step out; locate the overflow points and checking buffer overflow caused by integer overflow. We have implemented our approach in three buffer overflow types: format string overflow, stack overflow and heap overflow. Experiments results show that our approach is effective and efficient. We have detected more than 5 known integer overflow vulnerabilities via buffer overflow. 展开更多
关键词 integer overflow format string overflow buffer overflow
在线阅读 下载PDF
Detection of Buffer Overflow Attacks with Memoization-based Rule Set
5
作者 OğuzÖzger HalitÖztekİn 《Journal of Computer Science Research》 2023年第4期13-26,共14页
Different abnormalities are commonly encountered in computer network systems.These types of abnormalities can lead to critical data losses or unauthorized access in the systems.Buffer overflow anomaly is a prominent i... Different abnormalities are commonly encountered in computer network systems.These types of abnormalities can lead to critical data losses or unauthorized access in the systems.Buffer overflow anomaly is a prominent issue among these abnormalities,posing a serious threat to network security.The primary objective of this study is to identify the potential risks of buffer overflow that can be caused by functions frequently used in the PHP programming language and to provide solutions to minimize these risks.Static code analyzers are used to detect security vulnerabilities,among which SonarQube stands out with its extensive library,flexible customization options,and reliability in the industry.In this context,a customized rule set aimed at automatically detecting buffer overflows has been developed on the SonarQube platform.The memoization optimization technique used while creating the customized rule set enhances the speed and efficiency of the code analysis process.As a result,the code analysis process is not repeatedly run for code snippets that have been analyzed before,significantly reducing processing time and resource utilization.In this study,a memoization-based rule set was utilized to detect critical security vulnerabilities that could lead to buffer overflow in source codes written in the PHP programming language.Thus,the analysis process is not repeatedly run for code snippets that have been analyzed before,leading to a significant reduction in processing time and resource utilization.In a case study conducted to assess the effectiveness of this method,a significant decrease in the source code analysis time was observed. 展开更多
关键词 buffer overflow CYBERSECURITY ANOMALY SonarQube MEMOIZATION
在线阅读 下载PDF
Program Slicing Based Buffer Overflow Detection
6
作者 Yingzhou Zhang Wei Fu +1 位作者 Xiaofei Qian Wei Chen 《Journal of Software Engineering and Applications》 2010年第10期965-971,共7页
The development of the information technology has brought threats to human society when it has influenced seriously the global politics, economics and military etc. But among the security of information system, buffer... The development of the information technology has brought threats to human society when it has influenced seriously the global politics, economics and military etc. But among the security of information system, buffer overrun vulnerability is undoubtedly one of the most important and common vulnerabilities. This paper describes a new technology, named program slicing, to detect the buffer overflow leak in security-critical C code. First, we use slicing technology to analyze the variables which may be with vulnerability and extract the expressions which will bring memory overflow. Secondly, we utilize debug technology to get the size of memory applied by the variable and the size of memory used for these code segments (the slicing result) further. Therefore we can judge whether it will overflow according to the analysis above. According to the unique excellence of program slicing performing in the large-scale program’s debugging, the method to detect buffer overrun vulnerability described in this paper will reduce the workload greatly and locate the code sentences affected by corresponding variable set quickly, particularly including the potential vulnerability caused by parameter dependence among the subroutines. 展开更多
关键词 Program SLICING buffer overflow Inter-Procedure SLICING DEBUG System DEPENDENCE Graph
暂未订购
A Behavior-based Buffer Overflow Attack Blocker
7
作者 ZHANG Li-yuan Jin Li 《电脑知识与技术》 2010年第4期2544-2549,共6页
A common way to gain control of victim hosts is to launch buffer overflow attacks by remote exploits.This paper proposes a behavior-based buffer overflow attacker blocker,which can dynamically detect and prevent remot... A common way to gain control of victim hosts is to launch buffer overflow attacks by remote exploits.This paper proposes a behavior-based buffer overflow attacker blocker,which can dynamically detect and prevent remote buffer overflow attacks by filtering out the client requests that contain malicious executable codes.An important advantage of this approach is that it can block the attack before the exploit code begins affecting the target program.The blocker is composed of three major components,packet decoder,disassembler,and behavior-based detection engine.It decodes the network packets,extract possible instruction sequences from the payload,and analyzes whether they contain attack behaviors.Since this blocker based its effectiveness on the commonest behavior patterns of buffer overflow shellcode,it is expected to detect not only existing attacks but also zero-day attacks.Moreover,it has the capability of detecting attack-size obfuscation. 展开更多
在线阅读 下载PDF
A buffer overflow detection and defense method based on RiSC-V instruction set extension
8
作者 Chang Liu Yan-Jun Wu +1 位作者 Jing-Zheng Wu Chen Zhao 《Cybersecurity》 EI CSCD 2024年第2期28-43,共16页
Buffer overflow poses a serious threat to the memory security of modern operating systems.It overwrites the con-tents of other memory areas by breaking through the buffer capacity limit,destroys the system execution e... Buffer overflow poses a serious threat to the memory security of modern operating systems.It overwrites the con-tents of other memory areas by breaking through the buffer capacity limit,destroys the system execution environ-ment,and provides implementation space for various system attacks such as program control flow hijacking.That makes it a wide range of harms.A variety of security technologies have been proposed to deal with system security problems including buffer overflow.For example,No eXecute(NX for short)is a memory management technology commonly used in Harvard architecture.It can refuse the execution of code which residing in a specific memory,and can effectively suppress the abnormal impact of buffer overflow on control flow.Therefore,in recent years,it has also been used in the field of system security,deriving a series of solutions based on NX technology,such as ExecShield,DEP,StackGuard,etc.However,these security solutions often rely too much on the processor archi-tecture so that the protection coverage is insufficient and the accuracy is limited.Especially in the emerging system architecture field represented by RiSC-V,there is still a lack of effective solutions for buffer overflow vulnerabilities.With the continuous rapid development of the system architecture,it is urgent to develop defense methods that are applicable to different system application environments and oriented to all executable memory spaces to meet the needs of system security development.Therefore,we propose BOP,A new system memory security design method based on RISC-V extended instructions,to build a RISC-V buffer overflow detection and defense system and deal with the buffer overflow threat in RIsC-V.According to this method,NX technology can be combined with program control flow analysis,and Nx bit mechanism can be used to manage the executability of memory space,so as to achieve a more granular detection and defense of buffer overflow attacks that may occur in RISC-V system environment.In addition,The memory management and control function of BOP is not only very suitable for solving the security problems in the existing single architecture system,but also widely applicable to the combina-tion of multiple heterogeneous systems. 展开更多
关键词 RISc-V Operating system security buffer overflow Control flow hijacking Nx bit Xibop
原文传递
Automatic Buffer Overflow Warning Validation 被引量:1
9
作者 Feng-Juan Gao Yu Wang +2 位作者 Lin-Zhang Wang Zijiang Yang Xuan-Dong Li 《Journal of Computer Science & Technology》 SCIE EI CSCD 2020年第6期1406-1427,共22页
Static buffer overflow detection techniques tend to report too many false positives fundamentally due to the lack of software execution information. It is very time consuming to manually inspect all the static warning... Static buffer overflow detection techniques tend to report too many false positives fundamentally due to the lack of software execution information. It is very time consuming to manually inspect all the static warnings. In this paper, we propose BovInspector, a framework for automatically validating static buffer overflow warnings and providing suggestions for automatic repair of true buffer overflow warnings for C programs. Given the program source code and the static buffer overflow warnings, BovInspector first performs warning reachability analysis. Then, BovInspector executes the source code symbolically under the guidance of reachable warnings. Each reachable warning is validated and classified by checking whether all the path conditions and the buffer overflow constraints can be satisfied simultaneously. For each validated true warning, BovInspector provides suggestions to automatically repair it with 11 repair strategies. BovInspector is complementary to prior static buffer overflow discovery schemes. Experimental results on real open source programs show that BovInspector can automatically validate on average 60% of total warnings reported by static tools. 展开更多
关键词 buffer overflow static analysis warning symbolic execution automatic repair
原文传递
An Buffer Overflow Automatic Detection Method Based on Operation Semantic
10
作者 ZHAO Dong-fan LIU Lei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2005年第3期63-66,共4页
Buffer overflow is the most dangerous attack method that can be exploited. According to the statistics of Computer Emergency Readiness Team ( CERT ), buffer overflow accounts for 50% of the current software vulnerab... Buffer overflow is the most dangerous attack method that can be exploited. According to the statistics of Computer Emergency Readiness Team ( CERT ), buffer overflow accounts for 50% of the current software vulnerabilities, and this ratio is going up. Considering a subset of C language, Mini C, this paper presents an abstract machine model that can realire buffer overflow detection, which is based on operation semantic. Thus the research on buffer overflow detection can be built on strict descriptions of operation semantic. Not only the correctness can be assured, but also the system can be realized and extended easily. 展开更多
关键词 buffer overflow detection abstract machine program analysis
原文传递
基于Qiling的自动化缓冲区溢出漏洞挖掘与利用技术研究
11
作者 平源 何楠 +2 位作者 高国士 张云航 马慧 《许昌学院学报》 2025年第5期100-105,共6页
基于Qiling二进制模拟框架,提出了一种自动化缓冲区溢出漏洞挖掘与利用方法.方案包括四部分:首先,结合污点传播技术精准定位输入源;其次,利用Angr符号执行与递归算法求解路径约束;然后,采用动静结合的方法检测溢出漏洞并计算偏移量;最后... 基于Qiling二进制模拟框架,提出了一种自动化缓冲区溢出漏洞挖掘与利用方法.方案包括四部分:首先,结合污点传播技术精准定位输入源;其次,利用Angr符号执行与递归算法求解路径约束;然后,采用动静结合的方法检测溢出漏洞并计算偏移量;最后,通过模块化设计生成可复用的ROP链攻击模块,实现漏洞利用标准化.该研究为二进制漏洞自动化分析提供了一种有效方案,对软件安全性提升具有重要意义. 展开更多
关键词 二进制漏洞 缓冲区溢出 Qiling框架 符号执行 自动化漏洞挖掘
在线阅读 下载PDF
考虑接驳链路溢出的项目缓冲动态监控 被引量:1
12
作者 万丹 高凯烨 《系统管理学报》 北大核心 2025年第2期400-411,共12页
为了充分发挥项目缓冲作为风险吸收机制的作用,提出了一种考虑接驳链路溢出的项目缓冲动态监控方法。该方法以接驳缓冲汇入处为节点,对关键链进行阶段划分,进而分析项目执行时接驳链路发生溢出时对关键链的影响。根据接驳链路溢出造成... 为了充分发挥项目缓冲作为风险吸收机制的作用,提出了一种考虑接驳链路溢出的项目缓冲动态监控方法。该方法以接驳缓冲汇入处为节点,对关键链进行阶段划分,进而分析项目执行时接驳链路发生溢出时对关键链的影响。根据接驳链路溢出造成的二级项目缓冲消耗量,确定非关键链对汇入关键链活动的干扰权重系数。结合关键链阶段持续时间占比和汇入节点处的网络复杂度,对项目缓冲量进行阶段定量分配,以确定缓冲阶段式滚动状态下的动态监控量和相应的基准点。仿真实验显示,本文方法能够更充分地利用项目缓冲,对接驳链路缓冲溢出造成的干扰进行二次吸收,在确保项目完工概率的同时缩短项目工期和成本,克服了现有缓冲监控方式的不足,提高了缓冲监控的准确性。 展开更多
关键词 关键链项目管理 接驳链路溢出 项目缓冲 动态分配 滚动监控
在线阅读 下载PDF
本地缓冲区溢出问题的深度分析
13
作者 张超生 《计算机应用文摘》 2025年第3期191-192,195,共3页
本地缓冲区溢出是一种普遍且危险的漏洞,广泛存在于各种操作系统和应用软件中。它是指向程序的缓冲区输入超出其容量的数据,导致数据溢出并覆盖相邻内存空间,从而破坏程序的正常运行,甚至可能使攻击者获取程序或系统的控制权。文章详细... 本地缓冲区溢出是一种普遍且危险的漏洞,广泛存在于各种操作系统和应用软件中。它是指向程序的缓冲区输入超出其容量的数据,导致数据溢出并覆盖相邻内存空间,从而破坏程序的正常运行,甚至可能使攻击者获取程序或系统的控制权。文章详细阐述了本地缓冲区溢出的原理,并通过程序代码示例进行分析,进一步探讨了防范本地缓冲区溢出的有效措施和技术手段。 展开更多
关键词 缓冲区 溢出 堆栈 拒绝服务
在线阅读 下载PDF
基于软件多样性的栈溢出保护技术
14
作者 梁超毅 叶子昂 +1 位作者 戴华昇 张为华 《计算机系统应用》 2025年第8期43-52,共10页
缓冲区溢出漏洞广泛存在于由不安全的高级语言所编写的程序中.利用缓冲区溢出漏洞,攻击者可以实现控制流劫持等危险攻击方式.基于Canary的栈保护技术是处理缓冲区溢出漏洞的一种简单有效且广泛部署的防御手段,然而位置固定和取值相同的... 缓冲区溢出漏洞广泛存在于由不安全的高级语言所编写的程序中.利用缓冲区溢出漏洞,攻击者可以实现控制流劫持等危险攻击方式.基于Canary的栈保护技术是处理缓冲区溢出漏洞的一种简单有效且广泛部署的防御手段,然而位置固定和取值相同的特点使其容易被攻击者分析和破解.本文提出一种基于软件多样性的栈保护技术,它以拥有随机化大小和偏移的异构Canary为核心,不仅能直接抵御常规Canary无法处理的泄漏类和覆盖类攻击,而且能构造出各种更加安全的多样性软件系统.实验结果表明,异构Canary在有效提升安全性的同时仅为SPEC CPU 2017基准程序集额外引入了不高于2%的编译开销和平均3.22%的运行开销. 展开更多
关键词 栈溢出保护 随机化 软件多样性 缓冲区溢出 控制流劫持
在线阅读 下载PDF
Effect of Transmission Control Protocol on Limited Buffer Cognitive Radio Relay Node 被引量:1
15
作者 Mohsen M. Tantawy 《Communications and Network》 2015年第3期139-145,共7页
Transmission Control Protocol (TCP) is the most important transport layer protocol being used nowadays. It suffers from many problems over mobile networks especially over Cognitive Radio (CR). CR is one of the latest ... Transmission Control Protocol (TCP) is the most important transport layer protocol being used nowadays. It suffers from many problems over mobile networks especially over Cognitive Radio (CR). CR is one of the latest mobile technologies that brings its own share of problems for TCP. The buffer overflow for CR secondary network relay node can affect the performance of TCP. The contribution of this paper is the novel cross-layer model being used to evaluate the effect of the TCP congestion control on the secondary relay node buffer size in Cognitive Radio Network (CRN). The performance has been assessed by buffer overflow probability. 展开更多
关键词 TCP CONGESTION Control COGNITIVE Radio Networks CROSS-LAYER Design buffer overflow
在线阅读 下载PDF
基于静态语义流图的漏洞检测模型
16
作者 李春艳 陈世阳 +2 位作者 易仲铁 林周勇 黄突 《计算机应用文摘》 2024年第20期159-161,共3页
随着软件系统的复杂性不断增加和规模的扩大,漏洞检测成为确保软件安全性和稳定性的重要环节,但传统的静态分析方法在应对复杂漏洞时表现出一定的局限性。文章提出了一种基于静态语义流图(Static Semantic Flow Graph,SSFG)的漏洞检测... 随着软件系统的复杂性不断增加和规模的扩大,漏洞检测成为确保软件安全性和稳定性的重要环节,但传统的静态分析方法在应对复杂漏洞时表现出一定的局限性。文章提出了一种基于静态语义流图(Static Semantic Flow Graph,SSFG)的漏洞检测模型。该模型结合了程序的语义信息和数据流分析,通过构建语义流图实现对软件漏洞的精准检测。实验结果表明,该方法在检测常见漏洞类型(如缓冲区溢出与SQL注入等)时具有较高的准确率和较强的有效性。 展开更多
关键词 静态语义流图 漏洞检测 软件漏洞 缓冲区溢出 SQL注入
在线阅读 下载PDF
基于多序列联配的攻击特征自动提取技术研究 被引量:25
17
作者 唐勇 卢锡城 +1 位作者 胡华平 朱培栋 《计算机学报》 EI CSCD 北大核心 2006年第9期1533-1541,共9页
误用入侵检测系统的检测能力在很大程度上取决于攻击特征的数量和质量.该文提出一种基于多序列联配的攻击特征自动提取方法:首先将可疑的网络数据流转化为序列加入到可疑数据池中;通过聚类将这些序列分为若干类别;最后利用该文提出的多... 误用入侵检测系统的检测能力在很大程度上取决于攻击特征的数量和质量.该文提出一种基于多序列联配的攻击特征自动提取方法:首先将可疑的网络数据流转化为序列加入到可疑数据池中;通过聚类将这些序列分为若干类别;最后利用该文提出的多序列联配算法对同一类中的序列进行联配,并以产生的结果代表一类攻击的特征.该方法的核心是该文提出的两种序列联配算法:奖励相邻匹配的全局联配算法CMENW(Contiguous-Matches Encouraging Needleman-Wunsch)和层次式多序列联配算法HMSA(Hierarchical Multi-Sequence Align-ment).CMENW算法克服了Needleman-Wunsch算法易产生碎片的问题,使得连续的特征片段能够尽量地予以保留;HMSA算法以层次式策略对多序列进行联配,支持通配符,并带有剪枝功能.该方法可以自动地提取包括变形病毒和缓冲区溢出在内的新攻击的特征,其主要优点是:(1)产生的攻击特征包含位置相关信息,因而相对传统的方法结果更加准确;(2)具有良好的抗噪能力. 展开更多
关键词 攻击特征提取 入侵检测 序列联配 变形蠕虫 缓冲区溢出攻击
在线阅读 下载PDF
缓冲区溢出攻击:原理,防御及检测 被引量:36
18
作者 蒋卫华 李伟华 杜君 《计算机工程》 CAS CSCD 北大核心 2003年第10期5-7,共3页
给出了缓冲区溢出的原理,分析了利用缓冲区溢出漏洞进行网络攻击的方法及其特征;从程序编写、程序检测、数据结构设计以及程序执行控制等多个角度对防止缓冲区溢出攻击进行了分析,提出了遏制利用缓冲区溢出漏洞进行攻击的一些方法。
关键词 缓冲区溢出 堆栈送出 黑客攻击 防御 缓冲区检测 缓冲区不可执行
在线阅读 下载PDF
缓冲区溢出攻击的分析和一种防卫算法RAP 被引量:8
19
作者 刘武 杨路 +1 位作者 任萍 舒航 《计算机应用》 CSCD 北大核心 2003年第1期4-6,共3页
基于缓冲区溢出的攻击是一种常见的安全攻击手段,文中从编程的角度分析了缓冲区溢出攻击(BOFA)、攻击成功的条件及攻击分类,并分析了抵御BOFA的方法。最后给出了一个能有效抵御BOFA的软件RAP的工作原理和算法。
关键词 防卫算法 RAP算法 堆栈 缓冲区 入侵检测 缓冲区溢出攻击 网络信息安全 计算机网络
在线阅读 下载PDF
一种基于代码静态分析的缓冲区溢出检测算法 被引量:16
20
作者 王雅文 姚欣洪 +1 位作者 宫云战 杨朝红 《计算机研究与发展》 EI CSCD 北大核心 2012年第4期839-845,共7页
缓冲区溢出目前已成为最常见的软件安全漏洞之一,从源代码形式来看,常见的缓冲区溢出漏洞主要有两种类型:数据拷贝和格式化字符串造成的缓冲区溢出.分析了常见缓冲区溢出漏洞发生的原因,给出了格式化字符串存储长度的计算方法,介绍了一... 缓冲区溢出目前已成为最常见的软件安全漏洞之一,从源代码形式来看,常见的缓冲区溢出漏洞主要有两种类型:数据拷贝和格式化字符串造成的缓冲区溢出.分析了常见缓冲区溢出漏洞发生的原因,给出了格式化字符串存储长度的计算方法,介绍了一种基于源代码静态分析的缓冲区溢出检测算法,该算法首先对源代码进行建模,构造其抽象语法树、符号表、控制流图、函数调用图,在此基础上运用区间运算技术来分析和计算程序变量及表达式的取值范围,并在函数间分析中引入函数摘要来代替实际的函数调用.最后使用该方法对开源软件项目进行检测,结果表明该方法能够有效地、精确地检测缓冲区溢出. 展开更多
关键词 安全漏洞 缓冲区溢出 静态分析 区间运算 函数摘要
在线阅读 下载PDF
上一页 1 2 18 下一页 到第
使用帮助 返回顶部