A Practical Online Approach to Protecting Kernel Heap Buffers in Kernel Modules

来源 :中国通信(英文版) | 被引量 : 0次 | 上传用户:wufj77
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades.To defeat this attack,many protection methods are proposed in recent years.However,most of these existing methods focus on user-level heap overflow detection.Only a few methods are proposed for kel heap protection.Moreover,all these kel protection methods need modifying the existing OS kel so that they may not be adopted in practice.To address this problem,we propose a lightweight virtualization-based solution that can protect the kel heap buffers allocated for the target kel modules.The key idea of our approach is to combine the static binary analysis and virtualization technology to trap a memory allocation operation of the target kel module,and then add one secure canary word to the end of the allocated buffer.After that,a monitor process is launched to check the integrity of the canaries.The evaluations show that our system can detect kel heap overflow attacks effectively with minimal performance cost.
其他文献
时下,随着法律制度的日臻完善,以及法院各项改革特别是审判方式改革步伐的加快,
初中英语入门教学是学生学好英语的关键,把握好了入门教学,就为以后的教学打好了基础,学生学起来就会形成良性循环,老师在教学中倍感轻松,从而为学生打开学习英语的大门。 B
期刊
央视的“涉黄”点名批评与不菲的合作费用、互联网电视监管细则的频繁出台、Google TV的全球强势发布……让正在步入发展轨道的中国联网电视产业变数横生。    绕不过去的内容监管    互联网电视向何处去?这是摆在每个彩电厂商面前的重大课题,也让相关产业链在广电总局和工信部之间的钢丝上左摇右摆。  “广电总局实行互联网电视牌照制度,具有很强的战略考虑。”在日前由康佳集团和中国电子商会联合主办的“首
Weibull分布在实际中有广泛的应用,有关分布参数的估计也有较多的研究.文[6]研究了形状参数的收缩估计;文[5]采用随机模拟方法(Monte-Carlo方法)比较Weibull分布形状参数的四
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生、测量监控等方面人手,介绍了S226海滨大桥
期刊
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生、测量监控等方面人手,介绍了S226海滨大桥
期刊
In traditional framework,mandatory access control (MAC) system and malicious software are run in kel mode.Malicious software can stop MAC systems to be started