Stack allocation law-based buffer overflow detection method
A buffer overflow and detection method technology, applied in the field of information security, can solve problems such as poor practicability and ineffective detection of buffer overflow
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] The technical solution of the present invention will be described in more detail below with reference to the drawings and embodiments.
[0019] The detection method of the buffer overflow based on the stack allocation law of the present invention is as figure 1 shown, including the following steps:
[0020] Waiting for the buffer to be allocated;
[0021] Record the size and content of this buffer allocation;
[0022] Among them, compared with the historical records, the content of detection includes but is not limited to: whether the buffer contains duplicate content; whether the allocation size of the buffer has obvious allocation rules;
[0023] Determine whether the buffer conforms to the allocation rule or whether the buffer has duplicate content;
[0024] Under the conditions of step C, detect buffer overflow attacks; if the conditions are not met, wait for the next buffer allocation.
[0025] Further description will be given below with two application exampl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 