博碩士論文 105522110 完整後設資料紀錄

DC 欄位 語言
DC.contributor資訊工程學系zh_TW
DC.creator林鈺凱zh_TW
DC.creatorYu-Kai Linen_US
dc.date.accessioned2019-8-20T07:39:07Z
dc.date.available2019-8-20T07:39:07Z
dc.date.issued2019
dc.identifier.urihttp://ir.lib.ncu.edu.tw:88/thesis/view_etd.asp?URN=105522110
dc.contributor.department資訊工程學系zh_TW
DC.description國立中央大學zh_TW
DC.descriptionNational Central Universityen_US
dc.description.abstract在眾多的攻擊手法中,Buffer overflow 造成的Code-Injection 攻擊是 一種很嚴重的攻擊方式。因為攻擊者可以任意執行惡意程式碼,可能會 造成memory leak、任意記憶體位置讀寫、最嚴重可以拿到主機控制權。 本篇論文設計了一套偵測Code-Injection 的方式,利用QEMU 和 Linux Kernel 配合,可以即時偵測並且找出在執行檔哪個地方發生 Code-Injection。zh_TW
dc.description.abstractIn many of attack methods, the Code-Injection attacks is a serious problem that makes attackers can execute malicious code arbitrarily. It may cause memory leak, arbitrarily memory read/write or even taking control on the host machine. We had designed a method to detect Code-Injection attacks. Using QEMU and Linux Kernel, we can not only detect read-time Code-Injection attacks but also locate functions of Code-Injection vulnerability.en_US
DC.subject緩衝區溢位zh_TW
DC.subject代碼注入zh_TW
DC.subjectBuffer overflowen_US
DC.subjectCode-Injectionen_US
DC.titleCIRD: A Solution to Detect Real-time Zero-day Code-Injection Atttacksen_US
dc.language.isoen_USen_US
DC.type博碩士論文zh_TW
DC.typethesisen_US
DC.publisherNational Central Universityen_US

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明