Font Size: a A A

Libsafeex: Dynamic Defense Buffer Overflow Attacks

Posted on:2008-10-06Degree:MasterType:Thesis
Country:ChinaCandidate:P ZhaoFull Text:PDF
GTID:2208360212479090Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Buffer Overflow Attacks are serious network attacks. They have seriously undermined the network lives of people. And They have brought huge economic losses to the countries and enterprises. Judging from the present situation, there is still a steady increase in such attacks. And the techniques used by attackers are "better and better". Researchers from all over the world are all trying to study how to detect, defense Buffer Overflow Attacks. Further, the researchers study how to recover the system and the data effectively.This paper studies three defensive tools—Libsafe, LibsafePlus and LibsafeXP, and analyzes the advantages and disadvantages of them. Then this paper presents a new Software Framework for defending Buffer Overflow Attacks— LibsafeEX base on the above three softwares. Using a new perspective of Combining source codes and binary executable files, this new software framework is researched and developed.The main work of this thesis includes:1. This paper analyses in detail the basic realization of the Buffer Overflow Attack and the new developments of attack techniques.2. This paper studies the existing techniques and tools of detecting and defending Buffer Overflow Attacks. A large number of existing literatures about Buffer Overflow Attacks are analysed and studied. From the reality of the whole enterprise, an effective defensive strategy is presented.3. Base on Libsafe, LibsafePlus, LibsafeXP, the software framework of LibsafeEX are presented. LibsafeEX is clearly divided into two parts of front-end and back-end. And the handling of each kind of information in LibsafeEX all has an independent module.4. This paper studies the structure of the ELF executable file. According to actual needs, the Red Black tree nodes and the structure of element list are designed. The Algorithms of extracting the information of ELF files and producing ELFEX files are designed with the Pointer Analysis. The Algorithms of insertion and deletion of nodes are developed for the special application.5. This paper compares LibsafeEX with other softwares of defensive Buffer...
Keywords/Search Tags:Buffer overflow, Security defense, Security detection, Network security
PDF Full Text Request
Related items