Font Size: a A A

Research On Protection Technology For Stack Overflow Attacks In Linux System

Posted on:2017-01-17Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2348330518496666Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With large progress of social and development of technology,computers and networks are more and more important to people.As you know,there comes a new era named Internet.Currently,Internet is developing toward the direction of "Internet+".Because of the usage of information and communication technology and the platform of Internet,"Internet+ many traditional industries" is creating a new industry.With"Internet+ financial,education,medical,video and entertainment" as the representative,the new industry is slowly changing our lives.Under the influence of the Internet,more and more job seekers want to become programmers,and it makes the usage of Linux operating system more and more frequent.However,the qualities and abilities of programmers are not the same,and there may exist some bad habits where they are programming.This will make a high security risk of cyber security,because this can be exploited by hackers to attack their soft or system.On the other hand,as a major buffer overflow attacks,Stack overflow attacks will cause great harm to our soft or system.So,it is very necessary to research protection technology for stack overflow attacks in Linux system.In this paper,we focus on the related technologies of Network security,and give our own methods to protect it.It's more secure,more efficient and more comprehensive than the traditional methods.Our methods are based on the research achievements at home and abroad,and is mainly against stack overflow attacks in Linux system.The main research work in the paper is divided into the following several parts.(1)From a computer perspective,we analyze the address space of processes and structure of function stacks in Linux system.The research indicates that Linux system is not very safe when it's compiling and running.The array may bound and shellcode may attack our system.(2)Based on the result of(1)'s analysis and the compiler of GCC,we propose three kinds of methods to protect the system against stack overflow attacks,and they are fstack-check,-z noexecstack and-fstack-protector.And we analyze them from source code,binary characteristics,runtime features,merits and drawbacks,and so on.Our analysis result indicates that our methods are good.(3)We have built a test system to verify our methods.According to the software engineering,including software development time,such as time of development,compilation and running,we test and verify the protection methods,then we analyze and evaluate the reliabilities and the influences to the performance of system.The research indicates that our methods to protect the attacks are very safe,efficient and comprehensive.And its performance overhead is less than 10%.
Keywords/Search Tags:Linux system, protection against stack overflow attacks, software engineering, test technology
PDF Full Text Request
Related items