
软件学报 ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscas.ac.cn
Journal of Software,2018,29(5):1179−1198 [doi: 10.13328/j.cnki.jos.005504] http://www.jos.org.cn
©中国科学院软件研究所版权所有. Tel: +86-10-62562563
缓冲区溢出漏洞分析技术研究进展
∗
邵思豪
1,2
,
高
庆
1,3
,
马
森
1,2
,
段富尧
1,2
,
马
骁
1,2
,
张世琨
1,2
,
胡津华
4
1
(高可信软件技术教育部重点实验室(北京大学),北京 100871)
2
(软件工程国家工程研究中心(北京大学),北京 100871)
3
(北京大学 信息科学技术学院,北京 100871)
4
(天津市职业病防治院(天津市工人医院) 信息科,天津 300011)
通讯作者: 高庆, E-mail: gaoqing@pku.edu.cn; 马森, E-mail: masen@pku.edu.cn
摘 要: 首先介绍了缓冲区溢出漏洞危害的严重性和广泛性,然后,从如何利用缓冲区溢出漏洞的角度,依次介绍
了缓冲区溢出漏洞的定义、操作系统内存组织方式以及缓冲区溢出攻击方式.将缓冲区溢出分析技术分为 3 类:自
动检测、自动修复以及运行时防护,并对每一类技术进行了介绍、分析和讨论.最后,对相关工作进行了总结,并讨
论了缓冲区溢出分析领域未来可能的 3 个研究方向:(1) 对二进制代码进行分析;(2) 结合机器学习算法进行分析;
(3) 综合利用多种技术进行分析.
关键词: 缓冲区溢出漏洞;攻击;分析;误报率;漏报率
中图法分类号: TP311
中文引用格式: 邵思豪,高庆,马森,段富尧,马骁,张世琨,胡津华.缓冲区溢出漏洞分析技术研究进展.软件学报,2018,29(5):
1179−1198. http://www.jos.org.cn/1000-9825/5504.htm
英文引用格式: Shao SH, Gao Q, Ma S, Duan FY, Ma X, Zhang SK, Hu JH. Progress in research on buffer overflow vulnerability
analysis technologies. Ruan Jian Xue Bao/Journal of Software, 2018,29(5):1179−1198 (in Chinese). http://www.jos.org.cn/1000-
9825/5504.htm
Progress in Research on Buffer Overflow Vulnerability Analysis Technologies
SHAO Si-Hao
1,2
,
GAO Qing
1,3
,
MA Sen
1,2
,
DUAN Fu-Yao
1,2
,
MA Xiao
1,2
,
ZHANG Shi-Kun
1,2
,
HU Jin-Hua
4
1
(Key Laboratory of High Confidence Software Technologies (Peking University), Ministry of Education, Beijing 100871, China)
2
(National Engineering Research Center for Software Engineering (Peking University), Beijing 100871, China)
3
(School of Electrical Engineering and Computer Science, Peking University, Beijing 100871, China)
4
(Information Department, Tianjin Occupational Diseases Precaution and Therapeutic Hospital (Tianjin Workers’ Hospital), Tianjin
300011, China)
Abstract: First, in this paper, the breadth and risk of buffer overflow vulnerabilities are introduced. Then, from the aspect of how to
exploit a buffer overflow vulnerability, an overview is provided on the definition of buffer overflow vulnerabilities, memory organization
in operation systems, and classification of buffer overflow attacks. Based on the research, buffer overflow analysis technologies are
classified into three categories: automatic detection, automatic repair, and run-time protection. Each types of technologies are introduced,
analyzed and discussed according to the classification. Finally, three possible research directions in the field of buffer overflow
vulnerability analysis are discussed: (1) analyzing binary code; (2) using machine learning algorithms; (3) combining multiple
technologies for analysis.
∗ 基金项目: 国家重点研发计划(2017YFB0802900); 中国博士后科学基金(2017M620524); 北京市自然科学基金(4182024)
Foundation item: National Key Research and Development Program of China (2017YFB0802900); China Postdoctoral Science
Foundation (2017M620524); Beijing Municipal Natural Science Foundation (4182024)
本文由软件安全漏洞检测专题特约编辑王林章教授、陈恺研究员、王戟教授推荐.
收稿时间: 2017-07-02; 修改时间: 2017-08-29; 采用时间: 2017-11-21; jos 在线出版时间: 2018-01-09
评论