首页 | 本学科首页   官方微博 | 高级检索  
     

计算机系统的安全隐患—缓冲区溢出攻击
引用本文:刘敏娜,葛萌.计算机系统的安全隐患—缓冲区溢出攻击[J].数字社区&智能家居,2009(10).
作者姓名:刘敏娜  葛萌
作者单位:咸阳师范学院计算机科学系;
基金项目:教育厅研究计划项目,项目编号(08JK482)
摘    要:在当前网络与分布式系统安全中,被广泛利用的50%以上都是缓冲区溢出。缓冲区溢出是通过向一个有限的空间缓冲区复制过长的字符串,从而破坏程序的堆栈,使程序转而执行其它的指令,以达到攻击的目的。该文通过分析缓冲区溢出攻击的原理,提出数组边界检查等方法来对缓冲区溢出攻击进行防御。

关 键 词:缓冲区溢出攻击  堆栈  防御方法  

Computer System Security-Buffer Overflow Attack
LIU Min-na,GE Meng.Computer System Security-Buffer Overflow Attack[J].Digital Community & Smart Home,2009(10).
Authors:LIU Min-na  GE Meng
Affiliation:Xianyang Normal College;Department of Computer Science;Xianyang 712000;China
Abstract:In the current network and distributed system security,buffer overflow is widely used by more than 50%.Buffer overflow is limited space to a buffer copy of the string is too long,thus undermining the process stack,so that the implementation of other procedures turn instructions,so as to achieve the purpose of the attack.In this paper,by analyzing the principles of buffer overflow attacks,the array of border checkpoints and other methods to defend buffer overflow attacks.
Keywords:buffer overflow attacks  stack  defense methods  
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号