Citation: | TAN Yu-an, CAO Yuan-da. Method of Preventing Buffer Overflow Attacks by Intercepting DLL Functions[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2005, 14(3): 255-259. |
[1] |
Chien E,Sz r P.Blended attacks!Ex ploits,vulnerabilities and buffer overflow techniques in computer viruses[Z] .Virus Bulletin Co nference,Louisiana,2002.
|
[2] |
L arochelle D,Evans D.Statically detecting likely bufferov erflow vulnerabilities[Z] .T he 2001 U SEN IX SecuritySymposium,Washington D C,2001.
|
[3] |
Cowan C,Pu C,Maier D,et al.Stack Guar d:A utomatic adaptive detection and prevention of buffer overflowattacks[Z] .T he 7th U SEN IX Secur ity Conference,SanA ntonio,1998.
|
[4] |
O penw all Project.L inux kernel patch from the Openw allproject[EB/OL] .http:ww w.openw all.com/linux/,2003-06-15/2004-03-26.
|
[5] |
G oldberg I,Wagner D,T ho mas R,et al.A secure environment for untrusted helper applications[Z] .T heU SENI X 6th UN IX Security Symposium,San Jose,1996.
|
[6] |
Ber naschi M,G abrielli E,M ancini V L.Enhancementsto the L inux kernel for blocking buffer overflow based attacks[Z] .T he 4th Annual Linux Show case&Conference,Atlanta,2000.
|
[7] |
G alen H,Doug B.Detours:Binar y interception ofWin32 functions[Z] .T he 3rd U SEN IX W indows NTSymposium,Seattle,1999.
|
[8] |
L itchfield D.Non stack based exploitation of buffer overrun vulner abilit ies on Window s N T/2000/XP[EB/OL] .http:ww w.nextg enss.com,2002-03-05/2004-03-26.
|