English  |  正體中文  |  简体中文  |  Items with full text/Total items : 27005/38806
Visitors : 2402848      Online Users : 69
RC Version 4.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Adv. Search

Please use this identifier to cite or link to this item: http://ntour.ntou.edu.tw:8080/ir/handle/987654321/6585

Title: 可防制緩衝區溢位攻擊之處理器架構延伸設計
Design of an Architecture Extension for Buffer Overflow Prevention
Authors: Chi-Wei Luo
Contributors: NTOU:Department of Electrical Engineering
Keywords: 軟體安全;緩衝區溢位;x86架構;回返位址;記憶體堆疊
software securtiy;buffer overflow;x86 architecture;return address;stack
Date: 2004
Issue Date: 2011-06-22T08:52:37Z
Abstract: 摘要 隨著軟體的規模以及複雜度日益增加,軟體漏洞被發現的數目愈來愈多,所造成的電腦安全威脅也日益升高。近幾年來,對軟體安全危害最烈的就是緩衝區溢位問題。緩衝區溢位攻擊是利用軟體在宣告和使用某些區域變數時沒有做邊界檢查的漏洞進行攻擊,例如將記憶體堆疊內存放的回返位址覆寫,並注入攻擊程式,因而得以奪取執行權限,竊取資料,或重新格式化整個系統等。由於緩衝區溢位攻擊對電腦安全所造成的嚴重危害,已有不少相關的研究與防治措施被提出。本論文是以Intel x86的架構為基礎,設計一個緩衝區溢位的預防機制。我們針對處理器搬移指令作條件式檢查,以確保儲存回返位址的記憶體位置不會被覆寫,因而達到防堵緩衝區溢位之安全漏洞。 關鍵字:軟體安全,緩衝區溢位,x86架構,回返位址,記憶體堆疊。
Abstract With the ever increasing size and complexity of software, the number of software vulnerabilities which are exposed continues to grow at a troublesome pace. As a consequence, software security has become a major concern of not only the IT professionals, but also of the general public. Among the many software security attacks the world has confronted in recent years, the notorious “buffer overflow” attack scheme is arguably the most vicious and damaging of all. The buffer overflow attack works primarily by exploiting the absence of boundary detection when programs declare and use local variables. A malicious attacker using the buffer overflow scheme is often able to overwrite the return addresses stored in the stack and inject a piece of code to obtain execution authorization, steal data, or reformat the entire file system, etc. Due to the extensive damages it has inflicted, many prevention measures designed to stop buffer overflow have been proposed with various levels of effectiveness. In this paper, an x86 architecture specific, new defensive mechanism is proposed to prevent the return addresses of functions from being overwritten. We propose an extension to the processor architecture in which conditional checks on the MOV instructions are performed to ensure that the return addresses in the memory are secure from been written over. Our verification shows that the proposed mechanism is effective in guarding a system against buffer overflow attacks. Keywords: Software Security, Buffer Overflow, x86 Architecture, Return Address, Stack.
URI: http://ethesys.lib.ntou.edu.tw/cdrfb3/record/#G0M92530021
Appears in Collections:

Files in This Item:

There are no files associated with this item.

All items in NTOUR are protected by copyright, with all rights reserved.


著作權政策宣告: 本網站之內容為國立臺灣海洋大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,請合理使用本網站之內容,以尊重著作權人之權益。
網站維護: 海大圖資處 圖書系統組
DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback