首页> 外文学位 >Secure Bit: Buffer-overflow protection.
【24h】

Secure Bit: Buffer-overflow protection.

机译:安全位:缓冲区溢出保护。

获取原文
获取原文并翻译 | 示例

摘要

For decades, buffer-overflow attacks have remained the most persistent threat to the computer security world. The most common type of buffer-overflow attacks is an attack that changes the control flow by overflowing control data.; In this thesis, Secure Bit, architectural approach, is proposed to protect against buffer-overflow attacks on control data (return-address and function-pointer attacks in particular). Secure Bit provides a hardware bit to enforce the integrity of addresses from being modified by external data (input). Secure Bit is completely transparent to user software; providing full backward compatibility with legacy user code. It can detect and prevent all address-corrupting buffer-overflow attacks with little run-time performance penalty. Addresses passed in buffers between processes are marked insecure and control instructions using those addresses as targets will raise an exception. An important differentiating aspect of this protocol is that once an address has been marked as insecure there is no instruction to remark it as secure.; To validate Secure Bit, we first theoretically pursue a secure system with respect to buffer-overflow attacks and prove that Secure Bit provides a sufficient condition for preventing buffer-overflow attacks. Robustness and transparency are demonstrated by emulating the hardware, and booting Linux on the emulator, running application software on that Linux, and performing known attacks. In addition to the cost analysis and issues related to the success of Secure Bit, we also suggest possible attacks that may not be protected by Secure Bit.; In addition to the proposed Secure Bit, this thesis also provides a survey of current approaches against buffer-overflow attacks. Notably, approaches are conceptually grouped into three broad categories providing a platform for studying buffer-overflow protection schemes.
机译:几十年来,缓冲区溢出攻击一直是对计算机安全领域最持久的威胁。缓冲区溢出攻击最常见的类型是通过溢出控制数据来更改控制流的攻击。在本文中,提出了一种安全位架构方法,以防止对控制数据的缓冲区溢出攻击(特别是返回地址和功能指针攻击)。安全位提供了一个硬件位,以强制地址的完整性,以免被外部数据(输入)修改。 Secure Bit对用户软件完全透明;提供与旧版用户代码的完全向后兼容性。它可以检测和阻止所有破坏地址的缓冲区溢出攻击,而对运行时性能的影响很小。在进程之间的缓冲区中传递的地址被标记为不安全,使用这些地址作为目标的控制指令将引发异常。该协议的一个重要区别在于,一旦地址被标记为不安全,就没有指令将其标记为安全。为了验证Secure Bit,我们首先在理论上追求针对缓冲区溢出攻击的安全系统,并证明Secure Bit提供了防止缓冲区溢出攻击的充分条件。通过仿真硬件,在仿真器上启动Linux,在该Linux上运行应用程序软件以及执行已知的攻击,可以证明鲁棒性和透明性。除了成本分析和与Secure Bit成功有关的问题外,我们还建议可能不受Secure Bit保护的攻击。除了提议的安全位,本文还提供了针对当前针对缓冲区溢出攻击的方法的概述。值得注意的是,方法在概念上分为三大类,为研究缓冲区溢出保护方案提供了平台。

著录项

  • 作者

    Piromsopa, Krerk.;

  • 作者单位

    Michigan State University.;

  • 授予单位 Michigan State University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2006
  • 页码 119 p.
  • 总页数 119
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号