博碩士論文 101522008 完整後設資料紀錄

DC 欄位 語言
DC.contributor資訊工程學系zh_TW
DC.creator黃建瑋zh_TW
DC.creatorChi-Wei Huangen_US
dc.date.accessioned2014-7-31T07:39:07Z
dc.date.available2014-7-31T07:39:07Z
dc.date.issued2014
dc.identifier.urihttp://ir.lib.ncu.edu.tw:88/thesis/view_etd.asp?URN=101522008
dc.contributor.department資訊工程學系zh_TW
DC.description國立中央大學zh_TW
DC.descriptionNational Central Universityen_US
dc.description.abstractLinux Kernel 的弱點數目在2013年達到高峰,更勝過去自1991年以來的弱點數目。本篇論文關注於Privilege Escalation攻擊類型中任意寫入memory的防禦方式。 為了防止惡意的User拿到Root權限。最簡單的方法,當然就是把內核中的敏感資料結構設為唯讀。但是我們不確定未來內核是否有需要須改這些敏感的資料結構,所以我們在唯讀與可寫中取一個折衷的方法。 本論文所談論到的方法不僅僅,可以使用在以上的問題,更可以推廣到系統中有某一重要記憶體值,需要在某一安全範圍內更改,而不能只是單純的設定為唯讀。 zh_TW
dc.description.abstractThere have been more vulnerabilities in the Linux Kernel in 2013 than there had been in the previous decade. In this paper, the research was focused on defending against arbitrary memory overwrites in Privilege Escalation. To avoid malicious users getting root authority. The easiest way is to set the sensitive data structure to read-only. But we are not sure the sensitive data structure will never be modified by legal behavior from a normal device driver; thus, we posed a compatible solution between read-only solutions and writable solutions to enhance compatibility. The main idea that we posed not only solves the above problem, but also the general problem which is ensuring that important memory values can only be changed within a safe range. It is not just set to read-only. en_US
DC.subjectLinux Kernel Vulnerabilitieszh_TW
DC.subjectExploitzh_TW
DC.subjectPrivilege Escalationzh_TW
DC.subjectLinux Kernel Vulnerabilitiesen_US
DC.subjectExploiten_US
DC.subjectPrivilege Escalationen_US
DC.titleLibra: A Compatible Method for Defending Against Arbitrary Memory Overwriteen_US
dc.language.isoen_USen_US
DC.type博碩士論文zh_TW
DC.typethesisen_US
DC.publisherNational Central Universityen_US

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明