Unlock instant, AI-driven research and patent intelligence for your innovation.

Stack allocation law-based buffer overflow detection method

A buffer overflow and detection method technology, applied in the field of information security, can solve problems such as poor practicability and ineffective detection of buffer overflow

Inactive Publication Date: 2010-11-17
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The detection method described above cannot effective

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stack allocation law-based buffer overflow detection method
  • Stack allocation law-based buffer overflow detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The technical solution of the present invention will be described in more detail below with reference to the drawings and embodiments.

[0019] The detection method of the buffer overflow based on the stack allocation law of the present invention is as figure 1 shown, including the following steps:

[0020] Waiting for the buffer to be allocated;

[0021] Record the size and content of this buffer allocation;

[0022] Among them, compared with the historical records, the content of detection includes but is not limited to: whether the buffer contains duplicate content; whether the allocation size of the buffer has obvious allocation rules;

[0023] Determine whether the buffer conforms to the allocation rule or whether the buffer has duplicate content;

[0024] Under the conditions of step C, detect buffer overflow attacks; if the conditions are not met, wait for the next buffer allocation.

[0025] Further description will be given below with two application exampl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a stack allocation law-based buffer overflow detection method, which comprises: waiting to allocate a buffer; recording the size and content of the buffer allocation; judging if the buffer is in accordance with the allocation law or has repeated contents; and under the condition that the buffer is in accordance with the allocation law and has repeated contents, detecting buffer overflow attacks. The method provided by the invention can realize the effective detection of the overflow attacks of the buffers of which the allocation law and allocated contents are known.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for detecting buffer overflow based on stack allocation rules. Background technique [0002] With the development and popularization of the Internet, the proportion of virus transmission through the network is gradually increasing, and with it comes more and more prominent information security issues. Buffer overflow is an attack method that has been on the rise in recent years. Attackers use browser vulnerabilities or system vulnerabilities to mount horse attacks, cover malicious codes to designated locations and execute them, in order to achieve the purpose of the attack. The current detection methods for buffer overflow include the following: [0003] 1. Detect through the buffer content to determine whether the content is an attack code. This method is accurate in detection, but the characteristics of the attack code must be known. In-depth analysis ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/56
Inventor 关墨辰
Owner BEIJING ANTIY NETWORK SAFETY TECH CO LTD