Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dynamic measuring method of buffer overflow on the basis of logic isolation

A buffer overflow and logical isolation technology, applied in the field of information security, can solve problems such as being unable to resist overflow attacks and not being able to detect overflow attacks

Active Publication Date: 2011-07-20
BEIJING UNIV OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, when the stack frame is popped, only the buffer in the stack frame is checked, which cannot resist the overflow attack of attack example 4
Therefore, the security check of the current stack frame is only performed when the function returns, and overflow attacks on other data that the function depends on during execution cannot be found.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic measuring method of buffer overflow on the basis of logic isolation
  • Dynamic measuring method of buffer overflow on the basis of logic isolation
  • Dynamic measuring method of buffer overflow on the basis of logic isolation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The embodiment of the present invention provides a dynamic measurement method for buffer overflow based on logical isolation, which realizes fine-grained logical isolation of different types of data in the state space, and on the basis of the logical isolation, proposes a buffer overflow The dynamic measurement method of overflow refines the implementation of the method on the stack, so as to establish the integrity measurement mechanism of the process running state space.

[0065] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0066] Combined with the diagram, the management of stack space data storage is described in detail.

[0067] Figure 6 is the invention in Figure 5 Based on the data logic isolation provided by the embodiment of the stack.

[0068] Such as Figure 6 The storage status o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dynamic measuring method of buffer overflow on the basis of logic isolation, comprising the steps of logic isolation of buffer data and buffer dynamic measurement on the basis of the logic isolation in an operation process so as to detect the buffer overflow. Different data types are stored in continuous linear physical spaces without modifying the current structure of acomputer system. The dynamic measuring method comprises the following steps: by inserting an isolation mark, storing the buffer data in the low address direction of the isolation mark, and storing pointer data in the high address direction of the isolation mark to form a state space subset ranging from the low address to the high address of a memory, wherein a buffer comprises a plurality of continuous state space subsets; and based on the logic isolation, checking the completeness of the isolation mark by the dynamic measuring method to judge whether the buffer overflow occurs in or not. Thedynamic measuring method of buffer overflow on the basis of logic isolation can be applied to buffers with different applications, in particular to stacks. The method is optimized in measuring time and measuring range to overcome the defects of the traditional method.

Description

technical field [0001] The invention relates to the field of information security, in particular to a dynamic measurement method for buffer overflow based on logic isolation. Background technique [0002] Buffer overflow refers to when more data than the buffer's processing capacity is copied into a buffer that has allocated a certain storage space, a buffer overflow will occur. Overflow destroys the integrity of the data space. Overflow includes heap overflow and stack overflow. [0003] The buffer overflow attack is to overwrite the pointer to the execution code by overflowing, so that the pointer points to the injected malicious code, thereby changing the control flow of the program and running the program injected by the outside world. Therefore, the key point of the attack is to destroy the integrity of the pointer data space. [0004] There are currently two main modes of buffer overflow attack. First, the data written to the buffer contains shellcode (executable b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/22G06F21/52
Inventor 沈昌祥李晨李瑞华张兴庄琭公备
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products