DC 欄位 |
值 |
語言 |
DC.contributor | 資訊工程學系 | zh_TW |
DC.creator | 林鈺凱 | zh_TW |
DC.creator | Yu-Kai Lin | en_US |
dc.date.accessioned | 2019-8-20T07:39:07Z | |
dc.date.available | 2019-8-20T07:39:07Z | |
dc.date.issued | 2019 | |
dc.identifier.uri | http://ir.lib.ncu.edu.tw:88/thesis/view_etd.asp?URN=105522110 | |
dc.contributor.department | 資訊工程學系 | zh_TW |
DC.description | 國立中央大學 | zh_TW |
DC.description | National Central University | en_US |
dc.description.abstract | 在眾多的攻擊手法中,Buffer overflow 造成的Code-Injection 攻擊是
一種很嚴重的攻擊方式。因為攻擊者可以任意執行惡意程式碼,可能會
造成memory leak、任意記憶體位置讀寫、最嚴重可以拿到主機控制權。
本篇論文設計了一套偵測Code-Injection 的方式,利用QEMU 和
Linux Kernel 配合,可以即時偵測並且找出在執行檔哪個地方發生
Code-Injection。 | zh_TW |
dc.description.abstract | In many of attack methods, the Code-Injection attacks is a serious problem that makes attackers can execute malicious code arbitrarily. It may cause memory leak, arbitrarily memory read/write or even taking control on the host machine.
We had designed a method to detect Code-Injection attacks. Using QEMU and Linux Kernel, we can not only detect read-time Code-Injection attacks but also locate functions of Code-Injection vulnerability. | en_US |
DC.subject | 緩衝區溢位 | zh_TW |
DC.subject | 代碼注入 | zh_TW |
DC.subject | Buffer overflow | en_US |
DC.subject | Code-Injection | en_US |
DC.title | CIRD: A Solution to Detect Real-time Zero-day Code-Injection Atttacks | en_US |
dc.language.iso | en_US | en_US |
DC.type | 博碩士論文 | zh_TW |
DC.type | thesis | en_US |
DC.publisher | National Central University | en_US |