Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2008, Vol. 34 ›› Issue (23): 178-180. doi: 10.3969/j.issn.1000-3428.2008.23.064

• Security Technology • Previous Articles     Next Articles

Analysis of Buffer Overflow Attack Based on State Graph

DONG Min, BI Sheng, QI De-yu, HU Li-xin   

  1. (Computer Architecture Laboratory, School of Computer Science & Engineering, South China University of Technology, Guangzhou 510640)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-12-05 Published:2008-12-05

基于状态图的缓冲区溢出攻击分析

董 敏,毕 盛,齐德昱,胡立新   

  1. (华南理工大学计算机科学与工程学院计算机体系结构实验室,广州 510640)

Abstract: Combining with the principles of the produce to buffer overflow attack, this paper analyzes the structure of buffer overflow attack codes, and describes the Snort rules used for buffer overflow attack inspection. It constructs a state-graph-based analysis model of buffer overflow attack, which has theoretical and practical meaning to buffer overflow attack analysis and prevention.

Key words: buffer overflow attack, state graph, Snort rule

摘要: 结合缓冲区溢出攻击产生的原理,分析缓冲区溢出攻击代码的结构,论述Snort规则对缓冲区溢出攻击的检测,在此基础上构建一个基于状态图的缓冲区溢出攻击的分析模型。该模型对于进一步明确缓冲区溢出攻击过程和完善缓冲区溢出攻击的检测和防御有很大的理论和实际意义。

关键词: 缓冲区溢出攻击, 状态图, Snort规则

CLC Number: