English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21692051      Online Users : 700
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 會議論文 >  Item 310904400/5973


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/5973


    Title: Detection of Buffer Overflow Attacks with QEMU Emulator
    Authors: Li-Ming Tseng;Hou-Xiang Kuo;Tian-Hao Chen
    Contributors: Department of Computer Science & Information Engineering, National Central University
    Date: 2007-12-20
    Issue Date: 2009-12-15
    Publisher: 亞洲大學資訊學院;中華電腦學會
    Abstract: Buffer overflow has always been a dominant issue of system security. Many computer viruses or worms exploit this vulnerability to damage computer systems. Although numerous researches have been proposed to defend such attack, solutions that were really used as standard were rare. The main reason is
    that few solutions can be compatible with user binary code. This paper chooses QEMU emulator to emulate a hardware behavior and selects SmashGuard mechanism to test its feasibility. The result showed
    that it will produce some problems, and the reason was analyzed. Hence, this paper proposed a two
    layer checking mechanism. In addition to checking the consistency of return address, validity of return
    address was also checked. The result demonstrates that this mechanism can differentiate and detect
    typical stack-smashing attack.
    Relation: 2007NCS全國計算機會議 12-20~21
    Appears in Collections:[資訊學院] 會議論文

    Files in This Item:

    There are no files associated with this item.



    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback