首页 | 官方网站   微博 | 高级检索  
     

堆溢出的攻击演变与防范
引用本文:李国乐,林志强,茅兵.堆溢出的攻击演变与防范[J].计算机工程与应用,2006,42(25):102-107,119.
作者姓名:李国乐  林志强  茅兵
作者单位:1. 南京大学软件新技术国家重点实验室,南京,210093
2. 南京大学计算机科学与技术系,南京,210093
基金项目:国家高技术研究发展计划(863计划)
摘    要:以栈溢出为主的缓冲区溢出研究取得了较为丰硕的成果,与其相比,堆溢出攻击要困难许多,研究力度也少了许多。然而我们绝不能低估基于堆的溢出攻击,事实上,堆溢出已经成为攻击软件的主要方式之一。论文从基本的堆溢出开始,详细研究了堆溢出的主要攻击手段及其演变,介绍了各种常见的防御措施,并且对这些研究成果进行了分析总结。最后陈述了我们对此问题的观点。

关 键 词:堆溢出  缓冲区溢出  攻击  防范  计算机安全
文章编号:1002-8331-(2006)25-0102-06
收稿时间:2006-03
修稿时间:2006-03

Heap Overflows :Evolution of Attacks and Defenses
LI Guo-Le,LIN Zhi-qiang,MAO Bing.Heap Overflows :Evolution of Attacks and Defenses[J].Computer Engineering and Applications,2006,42(25):102-107,119.
Authors:LI Guo-Le  LIN Zhi-qiang  MAO Bing
Affiliation:State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093;Department of Computer Science and Technology,Nanjing University, Nanjing 210093
Abstract:Heap overflows are more difficult to exploit than stack based overilows,and researches on it seem a Pit fewer comparing to the latter.However,we cannot underestimate the severity heap-based overflow attacks bring to computer systems,and in fact,heap overflow attacks have become one of the main methods compromising the software security.Commencing from the basic heap overflow attacks,this paper surveys all kinds of heap overflows vulnerabilities, most commonly used attacks and their evolutions.Various defense methods as well as summarizations to them are also narrated.Finally,we present our point of view on heap overflows.
Keywords:heap overflow  buffer overflow  attacks  defense  computer security
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号