Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Knowledge and Technology》 2008-19
Add to Favorite Get Latest Update

Utilization of Buffer Overflow

ZHONG Da-fu1,TANG Yi-fang1,LI Xiao-Jian2(1.School of Computer Science and Engineering,Guangdong Institute of Science and Technology,Zhuhai 519090,China;2.School of Information Engineering,University of Science and Technology Beijing,Beijing 100083,China;3.School of Computer Science,Beihang University,Beijing 100083,China)  
Discussion on the principle of buffer overflow attacks,Research at home and abroad buffer overflow attacks Category,Analysis the three types of buffer overflow attacks technical in-depth.Finally,Summary and analysis and comparison the three types of overflow attacks.
【Fund】: 国家“973”重点资助项目(2002CB312105);; 国家信息关防与网络安全保障可持续发展计划资助项目(2001-技2B-0052002-研2-A-007)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 2 Hits
1 WANG Lei1,2,3,ZHANG Yuqing1,2,WANG Li3,LANG Liang1,2(1.State Key Laboratory of Information Security,GSCAS,Beijing 100039;2.National Computer Network Intrusion Protection Center, GSCAS,Beijing 100039;3.Research Institute of Software Engineering,Xidian University,Xi'an 710071);Building of Exploit Attacking Defense System[J];Computer Engineering;2004-12
2 LI Xiao-jian~(1,2),ZHONG Da-fu~2,XIA Bing~2,TANG Yi-fang~2(1.School of Computer Science & Engineering,Beihang University,Beijing 100083,China;2.School of Mathematics & Computer Science,Guangxi Normal University,Guilin Guangxi 541004,China);Study on Buffer Overflow and Injected Code[J];Application Research of Computers;2007-01
【Co-citations】
Chinese Journal Full-text Database 9 Hits
1 FENG Xiao(ChongQing University of Post and Telecomcommunications,School of Computer Science and Technology,Chongqing 410065,China);On Vulnerability Exploiting of Buffer Overflow[J];Journal of Beijing Union University(Natural Sciences);2009-02
2 ;Research on Security C Complier of Double Stack[J];Computer Development & Applications;2005-09
3 ;Working Theory of Aggression Based on Buffer Overflow and Defence Scheme[J];Computer Security;2008-03
4 XIA Bing,DONG Zhiyong,JIN Qiu(School of Computer College,Zhongyuan Institute of Technology,ZhengZhou 450007,China);A Design of Automatic Attack Interpreter of Buffer Overflow[J];Journal of Henan Institute of Engineering(Natural Science Edition);2008-03
5 CUI Zhigang, TAN Yu’an, CAO Yuanda, ZHANG Xuelan (School of Information Science and Technology, Beijing Institute of Technology, Beijing 100081);Buffer Overflow Protection Based on Segment Limitation[J];Computer Engineering;2006-10
6 YAN Xi-ai1,2,YANG Jin-min1,TIAN Hua2(1 Software College of Hunan University,Changsha 410082,China;2 Hunan Public Security College,Changsha 410138,China);A survey of buffer overflow attack[J];Agriculture Network Information;2006-07
7 RONG Han-tao, WANG Xiao-bin, HAO Zong-bo, CUI Juan-na (School of Computer Science & Engineering, University of Electronic Science & Technology of China, Chengdu 611731, China);Research and design of instrumentation with no trap[J];Application Research of Computers;2011-01
8 Yan Xiai1,2,Yang Jinmin11 Software College of Hunan University,Hunan,4100822Department of Computer Science,Hunan Public Security College,Hunan,410138;Buffer Overflow Attack Analysis and Protection[J];Network Security Technology & Application;2006-03
9 BAI Bin (The Party School of XPCC of C.P.C, Wujiaqu 831300);Analysis and Design of Buffer Overflow Attack[J];Modern Computer;2009-09
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 LIU Kun (College of Electronic Information,SCU,Chengdu 610064,China);Discovering vulnerabilities model combined with reverse engineering and fuzz technology[J];Journal of Chengdu University of Information Technology;2008-02
2 Deng Fan,Liu Jian(Software Engineering Institute,Xidian University,Xi'an 710071,China);Study of Safety Vulnerabilities for Exception in C++ Programs[J];Electronic Science and Technology;2009-02
3 WANG Lei,LI Ji,LI Bo-yang (Computer School,Beihang University,Beijing 100083,China);Precisely Detecting Buffer Overflow Vulnerabilities[J];Acta Electronica Sinica;2008-11
4 Liu Hui1 Zhang Chongbin2 Zhang Xiaomin3(1 College of Computer Science and Technology,Huazhong University of Science and Technology,Wuhan430074,China;2 China Information Technology Security Certification Center,Beijing 100089,China;3 Institute of Information Science and Engineering,Shandong University,Jinan 250100,China);Application of model checking technology to automatically vulnerabilities finding in software[J];Journal of Huazhong University of Science and Technology(Nature Science Edition);2008-02
5 RONG Mei ZHANG Guang-Quan (Tourism College, Jinan University, Shenzhen 518053) (College of Computer Science and Technology,Suzhou University,Suzhou 215006) (Key Lab for Computer Science, Institute of Software, Chinese Academy of Sciences,Beijing 100080);New Approaches for Model Checking[J];Computer Science;2003-05
6 TAN Qing,HAN Zhen(School of Computer Information and Technology,Beijing Jiaotong University,Beijing 100044);Access Control Model of Defending Operating System Against Executable Malicious Code Effectively[J];Computer Engineering;2008-16
7 LAI Wei-ying, CHEN Xiu-zhen, LI Jian-hua(School of Electronic, Information and Electrical Engineering, Shanghai Jiaotong University, Shanghai 200240);Novel Active Vulnerability Detection System[J];Computer Engineering;2008-18
8 WANG Kai-jian,LUO Xiao-bo,ZHANG Tian-gang(Jiangnan Institute of Computing Technology,Wuxi Jiangsu 214083,China);Research and defence of new vulnerability exploiting method[J];Journal of Computer Applications;2008-05
9 ZHANG Long-jie, XIE Xiao-fang, YUAN Sheng-zhi,TANG Jiang(Department of Science and Technology of Weapons, Navy Aeronautical Engineering Academy, Yantai Shandong 264001, China);Detection techniques of format-string vulnerabilities in binary files[J];Journal of Computer Applications;2008-10
10 WANG Yong,ZENG Qing-kai(State Key Laboratory for Novel Software Technology,Dept.of Computer Science & Technology,Nanjing University,Nanjing 210093,China);Dynamic approach to detecting memory errors[J];Application Research of Computers;2008-05
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 Qiu Xiaopeng Zhang Yuqing Feng Dengguo (State Key Laboratory of Information Security,Graduate School of Chinese Academy of Sciences,Beijing 100039) (National Computer Network Intrusion Protection Center,GSCAS,Beijing 100039);Analysis on the Exploits of Buffer Overflow Vulnerabilities[J];Computer Engineering and Applications;2005-18
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved