博碩士論文 106522048 完整後設資料紀錄

DC 欄位 語言
DC.contributor資訊工程學系zh_TW
DC.creator侯均靜zh_TW
DC.creatorHou, Chun-Chingen_US
dc.date.accessioned2019-8-16T07:39:07Z
dc.date.available2019-8-16T07:39:07Z
dc.date.issued2019
dc.identifier.urihttp://ir.lib.ncu.edu.tw:88/thesis/view_etd.asp?URN=106522048
dc.contributor.department資訊工程學系zh_TW
DC.description國立中央大學zh_TW
DC.descriptionNational Central Universityen_US
dc.description.abstract返回導向程式設計(Return-Oriented Programming)是一種非常常見的緩衝區溢位攻擊,攻擊者可以蒐集程式的機器語言指令(Gadget),藉由這些指令序列來覆蓋掉堆疊上的返回地址,以達成控制程式執行流程的目的。 本論文設計了一套解決方案,名為 ROPRD ,透過修改 Linux Kernel 及 Binary Rewrite,在盡量不影響系統架構及效能的狀況下,來達成 ROP 攻擊的即時偵測。zh_TW
dc.description.abstractReturn-Oriented Programming (ROP) is a common Buffer-Overflow Attack. The attacker can collect some machine code in the program, which called ′Gadget′, combine those gadgets, and change the return address on the stack. This will cause the program execution process to be controlled by the attacker. We design a solution called ROPRD. We can detect ROP attacks in real-time without affecting the system architecture and performance by modifying Linux Kernel and using binary rewrite tool.en_US
DC.subject緩衝區溢位zh_TW
DC.subject返回導向程式設計zh_TW
DC.subjectBuffer Overflowen_US
DC.subjectROPen_US
DC.titleROPRD: A Solution to Detect Real-time Zero-day ROP Attacksen_US
dc.language.isoen_USen_US
DC.type博碩士論文zh_TW
DC.typethesisen_US
DC.publisherNational Central Universityen_US

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明