首页> 外文期刊>SIGCSE bulletin >Exploring Security Vulnerabilities by Exploiting Buffer Overflow using the MIPS ISA
【24h】

Exploring Security Vulnerabilities by Exploiting Buffer Overflow using the MIPS ISA

机译:通过使用MIPS ISA利用缓冲区溢出来探索安全漏洞

获取原文
获取原文并翻译 | 示例
           

摘要

By exploiting a well known security vulnerability in many C library implementations, it is possible for an unprivileged user to gain unrestricted system privileges. With an understanding of how the process execution stack is allocated and managed during process execution, a user can override the return address of a C library routine and thereby resume execution at a different address where a set of malicious functions can be invoked. This is known as the buffer overflow exploit. With buffer overflow as the underlying theme, an example will be described using C and the MIPS assembly language that simultaneously exposes students to issues in computer security, operating systems concepts such as memory management and function invocation/return, and the MIPS instruction set architecture.
机译:通过在许多C库实现中利用一个众所周知的安全漏洞,无特权的用户可以获得不受限制的系统特权。了解了流程执行过程中如何分配和管理流程执行栈后,用户可以覆盖C库例程的返回地址,从而在可以调用一组恶意功能的其他地址处恢复执行。这称为缓冲区溢出漏洞利用。以缓冲区溢出为基本主题,将使用C和MIPS汇编语言描述一个示例,该示例同时使学生了解计算机安全,操作系统概念(例如内存管理和函数调用/返回)以及MIPS指令集体系结构方面的问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号