检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
出 处:《信息安全与通信保密》2013年第7期77-79,82,共4页Information Security and Communications Privacy
摘 要:缓冲区溢出漏洞是危害最大、影响范围最广的漏洞之一,普遍存在于各类系统和应用软件中。操作系统中的数据执行保护(DEP,Data Execution Prevention)技术,是一项有效的安全保护技术,能够有效防范缓冲区溢出攻击,维护操作系统安全,但是该技术仍然存在一定的局限性。文中通过一个突破数据执行保护,利用缓冲区溢出漏洞成功执行注入代码的实例来说明数据执行保护技术存在的局限性,并提出了一些解决数据执行保护技术局限性的方法和建议。Buffer overflow is one of the most common vulnerabilities. Almost all systems and applications always suffer from buffer overflow vulnerabilities. DEP(Data Execution Prevention) is an effective security protection mechanism included in operating systems, and could effectively prevent an application or a system from being attacked with buffer overflow vulnerabilities. However, there inevitably exist some limitations. This paper explains, with an example in bypassing DEP and executing the code through a buffer overflow vulnerability these limitations of DEP Technology. Some methods and suggestions for solving these limitations are also proposed.
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.139.85.192