English  |  正體中文  |  简体中文  |  Items with full text/Total items : 68069/68069 (100%)
Visitors : 23154095      Online Users : 212
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/81323

    Title: CIRD: A Solution to Detect Real-time Zero-day Code-Injection Atttacks
    Authors: 林鈺凱;Lin, Yu-Kai
    Contributors: 資訊工程學系
    Keywords: 緩衝區溢位;代碼注入;Buffer overflow;Code-Injection
    Date: 2019-08-20
    Issue Date: 2019-09-03 15:44:25 (UTC+8)
    Publisher: 國立中央大學
    Abstract: 在眾多的攻擊手法中,Buffer overflow 造成的Code-Injection 攻擊是
    造成memory leak、任意記憶體位置讀寫、最嚴重可以拿到主機控制權。
    本篇論文設計了一套偵測Code-Injection 的方式,利用QEMU 和
    Linux Kernel 配合,可以即時偵測並且找出在執行檔哪個地方發生
    Code-Injection。;In many of attack methods, the Code-Injection attacks is a serious problem that makes attackers can execute malicious code arbitrarily. It may cause memory leak, arbitrarily memory read/write or even taking control on the host machine.
    We had designed a method to detect Code-Injection attacks. Using QEMU and Linux Kernel, we can not only detect read-time Code-Injection attacks but also locate functions of Code-Injection vulnerability.
    Appears in Collections:[資訊工程研究所] 博碩士論文

    Files in This Item:

    File Description SizeFormat

    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback  - 隱私權政策聲明