DC 欄位 |
值 |
語言 |
DC.contributor | 資訊工程學系 | zh_TW |
DC.creator | 侯均靜 | zh_TW |
DC.creator | Hou, Chun-Ching | en_US |
dc.date.accessioned | 2019-8-16T07:39:07Z | |
dc.date.available | 2019-8-16T07:39:07Z | |
dc.date.issued | 2019 | |
dc.identifier.uri | http://ir.lib.ncu.edu.tw:444/thesis/view_etd.asp?URN=106522048 | |
dc.contributor.department | 資訊工程學系 | zh_TW |
DC.description | 國立中央大學 | zh_TW |
DC.description | National Central University | en_US |
dc.description.abstract | 返回導向程式設計(Return-Oriented Programming)是一種非常常見的緩衝區溢位攻擊,攻擊者可以蒐集程式的機器語言指令(Gadget),藉由這些指令序列來覆蓋掉堆疊上的返回地址,以達成控制程式執行流程的目的。
本論文設計了一套解決方案,名為 ROPRD ,透過修改 Linux Kernel 及 Binary Rewrite,在盡量不影響系統架構及效能的狀況下,來達成 ROP 攻擊的即時偵測。 | zh_TW |
dc.description.abstract | Return-Oriented Programming (ROP) is a common Buffer-Overflow Attack. The attacker can collect some machine code in the program, which called ′Gadget′, combine those gadgets, and change the return address on the stack. This will cause the program execution process to be controlled by the attacker.
We design a solution called ROPRD. We can detect ROP attacks in real-time without affecting the system architecture and performance by modifying Linux Kernel and using binary rewrite tool. | en_US |
DC.subject | 緩衝區溢位 | zh_TW |
DC.subject | 返回導向程式設計 | zh_TW |
DC.subject | Buffer Overflow | en_US |
DC.subject | ROP | en_US |
DC.title | ROPRD: A Solution to Detect Real-time Zero-day ROP Attacks | en_US |
dc.language.iso | en_US | en_US |
DC.type | 博碩士論文 | zh_TW |
DC.type | thesis | en_US |
DC.publisher | National Central University | en_US |