【24h】

Improving Compiler to Prevent Buffer Overflow Attack

机译:改进编译器以防止缓冲区溢出攻击

获取原文
获取原文并翻译 | 示例

摘要

Recently, the cases of hacking that use buffer overflow vulnerabilities, are increasing. Although the buffer overflow problem has been known for a long time, for the following reasons, it continues to present a serious security threat. Detection methods of buffer overflow attack are defense methods that do not allow overwriting at all, overwriting but do not allow unauthorized change of control flow and allow change of control flow, hut prevents execution of injected code. This paper presents a solution to the problem of buffer overflow attacks: Defense methods in this belong to the second method of previously described ones. The existing defense method has some demerits. There needs the additional memory space. There takes more time than the original time in execution The code is added to prevent unauthorized change of control flow by compiler and is executed. In this paper, we propose new method that is more efficient than the existing method. we reduced the user of the additional memoiy space to the minimum in order to reduce the memory waste. It is the minimum that the processes prevent an authorized change of control flow
机译:最近,使用缓冲区溢出漏洞的黑客案例正在增加。尽管缓冲区溢出问题早已为人所知,但由于以下原因,它继续带来严重的安全威胁。缓冲区溢出攻击的检测方法是完全不允许覆盖,禁止但不允许未经授权更改控制流并允许更改控制流,完全禁止注入代码执行的防御方法。本文提出了一种解决缓冲区溢出攻击的方法:这种防御方法属于前面描述的第二种方法。现有的防御方法有一些缺点。需要额外的存储空间。执行所需的时间比原始时间要多。添加了代码以防止编译器对控制流进行未经授权的更改并执行。在本文中,我们提出了一种比现有方法更有效的新方法。我们将额外记忆空间的用户减少到最小,以减少内存浪费。流程阻止授权流程变更的最低要求

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号