首页 | 本学科首页   官方微博 | 高级检索  
     

缓冲区溢出攻击分析及其防范
引用本文:母晓科,刘苏,周游.缓冲区溢出攻击分析及其防范[J].计算机安全,2009(4):56-58.
作者姓名:母晓科  刘苏  周游
作者单位:解放军重庆通信学院,重庆,400035
摘    要:详细分析了缓冲区溢出的基本原理,描述了利用缓冲区溢出漏洞进行攻击的基本方式。通过对一段实例程序的溢出和构建攻击语句,直观地演示了缓冲区溢出的形成过程及其攻击原理,最后提出了防范缓冲区溢出的有效措施。

关 键 词:缓冲区溢出  堆栈  系统攻击

Buffer OverFlow Attacks Analysis and Prevention
MU Xiao-ke,CHEN Fang,ZHOU You.Buffer OverFlow Attacks Analysis and Prevention[J].Network & Computer Security,2009(4):56-58.
Authors:MU Xiao-ke  CHEN Fang  ZHOU You
Affiliation:Chinese People's Liberation Army Chong Qing Communications College;Chongqing 400035;China
Abstract:The basic principle of buffer overflow is analysised in this paper.The method of using the buffer overflow to attack the computer systems is also decribed,Through a section of programe, the process of the buffer overflow and its attacking actions are shown in details. At last,some valid methods are presented to guard against the buffer overflow.
Keywords:buffer overflow  stack area  system attacking  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号