计算机科学 ›› 2011, Vol. 38 ›› Issue (1): 73-77.

• 计算机网络与信息安全 • 上一篇    下一篇

防御缓冲区溢出攻击的数据随机化方法

严芬,袁赋超,沈晓斌,殷新春,茅兵   

  1. (扬州大学信息工程学院 扬州225009);(南京大学软件新技术国家重点实验室 南京210093)
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家863高技术计划项目(2007AA01Z448和2007AA01Z409),江苏省科技支撑计划基金项目(BE2008124)资助。

Data Randomization to Defend Buffer Overflow Attacks

YAN Fen,YUAN Fu-chao,SHEN Xiao-bing,YIN Xin-chun,MAO Bing   

  • Online:2018-11-16 Published:2018-11-16

摘要: 代码注入式攻击方法已经成为针对内存攻击的典型代表,缓冲区溢出攻击是其中最常用的一种代码注入攻击方法。它依靠修改程序的控制流指向,使程序转向预先注入的恶意代码区,以取得系统权限。提出了一种基于数据保护的随机化方法,即通过保护程序内的指针和数组来有效地防御缓冲区溢出攻击的方法。

关键词: 缓冲区溢出,数组保护,指针保护,数据随机化

Abstract: Code injection attack has become a typical representative of the attacks against memory,in which buffer over-flow attacks are the most commonly used. It relics on the change of control-flow, lets the program point to the malicious code in order to obtain the root rights. This paper presented a method using randomization based on data protection, wiich can defend buffer overflow attacks effectively, through the protection of pointers and arrays.

Key words: Buffer overflow,Array protection,PointUuard,Data randomization

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!