作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2010, Vol. 36 ›› Issue (2): 130-131. doi: 10.3969/j.issn.1000-3428.2010.02.046

• 安全技术 • 上一篇    下一篇

基于可执行文件的缓冲区溢出检测模型

黄玉文1,2,刘春英1,李肖坚2,3   

  1. (1. 菏泽学院计算机与信息工程系,菏泽 274015;2. 广西师范大学计算机与信息工程学院,桂林 541004;3. 北京航空航天大学北京市网络技术重点实验室,北京100083)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2010-01-20 发布日期:2010-01-20

Detection Model for Buffer Overflow Based on Executable File

HUANG Yu-wen1,2, LIU Chun-ying1, LI Xiao-jian2,3   

  1. (1. Computer and Information Engineering Department, Heze University, Heze 274015; 2. College of Computer Science and Information Engineering, Guangxi Normal University, Guilin 541004; 3. Beijing Key Laboratory of Network Technology, Beihang University, Beijing 100083)
  • Received:1900-01-01 Revised:1900-01-01 Online:2010-01-20 Published:2010-01-20

摘要: 给出缓冲区溢出的基本原理和现有检测技术,针对二进制可执行文件中存在的缓冲区溢出漏洞,提出一种缓冲区溢出检测模型,该模型采用静态检测和动态检测相结合的方法。对检测结果采取污点跟踪法进行人工分析,采用插件技术给出缓冲区溢出检测模型的具体设计。实验结果证明该模型的设计是有效的。

关键词: 缓冲区溢出, 可执行文件, 静态检测, 动态检测, 人工分析

Abstract: This paper describes the basic principles of buffer overflow and the current detection technology, and presents a detection model for buffer overflow vulnerability on binary executable file. The model uses static and dynamic detection technologies, and analyzes artificially the result in stain-tracking way. It gives specific reality for the detection model for buffer overflow in plug-in technology. Experimental results show effectiveness of the defection model.

Key words: buffer overflow, executable file, static detection, dynamic detection, artificial analysis

中图分类号: