:::

詳目顯示

回上一頁
題名:以資訊隱藏為基礎之惡意程式攻擊技術
書刊名:危機管理學刊
作者:劉江龍婁德權江天賜李建中 引用關係曾馭
作者(外文):Liu, C. L.Lou, D. C.Chiang, T. T.Lee, C. C.Tseng, Y.
出版日期:2008
卷期:5:1
頁次:頁13-22
主題關鍵詞:緩衝區溢位攻擊資訊隱藏藏密學惡意程式Buffer overflow attackInformation hidingSteganographyMalicious code
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:23
網際網路的普及使得緩衝區溢位攻擊成爲駭客最喜歡的攻擊技術之一,也成爲目前資訊安全領域中十分重視的問題。資訊隱藏技術可以將秘密訊息隱藏在一般的數位影像、聲音或動態影像內,以躲避人類感官的察覺。有報導顯示,已有惡意的緩衝區溢位程式隱藏在圖檔內以躲避防毒軟體的偵測。本文即在研究及實作一種以資訊隱藏爲基礎的緩衝區溢位攻擊技術。首先將可產生緩衝區溢位攻擊的程式碼嵌入至掩護圖檔之中,再利用模擬的影像處理程式萃取隱藏在掩護圖檔內的惡意程式碼,並進行緩衝溢位攻擊。實驗結果顯示,本文提出的以資訊隱藏爲基礎的緩衝區溢位攻擊技術可以有效躲避人類視覺系統及防毒軟體的偵測,同時可以有效發動緩衝區溢位攻擊。本研究可作爲資訊安全學界及業界進一步研究預防此類型攻擊之參考。
Because of the popularization of the Internet, the buffer overflow attack has become one of the favorite attacks of hackers and the most concern in the information security field. Steganography can hide the secret information in digital images, audios or videos to avoid the detection of the human sensory system. Therefore, it is reported that there has been malicious buffer overflow code embedded in the digital images to avoid the detection of anti-virus systems. This paper is to study and realize an information hiding-based buffer overflow attack. First, the malicious code which can result in a buffer overflow attack is embedded in a cover image. A simulative image processing program is then used to extract the embedded malicious code and perform the buffer overflow attack. Experimental results show that the proposed information hiding-based buffer overflow attack can effectively avoid both the detection of human visual system and various antivirus systems. Moreover, the proposed attack can also effectively launch a certain buffer overflow attack. The achievement of this study can be referred when developing prevention methods of such an attack.
期刊論文
1.Bender, W.、Gruhl, D.、Morimoto, N.、Lu, A.(1996)。Techniques for Data Hiding。IBM Systems Journal,35(3/4),313-336。  new window
2.Chen, T. S.、Chang, C. C.、Hwang, M. S.(1998)。A Virtual Image Cryptosystem Based Upon Vector Quantization。IEEE Transactions on Image Processing,7(10),1485-1488。  new window
3.Walton, S.(1995)。Image Authentication for a Slippery New Age。Dr. Dobb's Journal,20(4),18-26。  new window
4.Mielikainen, J.(2006)。LSB matching revisited。IEEE Signal Processing Letters,13(5),285-287。  new window
圖書
1.陳同孝、張真誠、黃國峰(2003)。數位影像處理技術。臺北市:旗標出版股份有限公司。  延伸查詢new window
其他
1.Blomgren, M.(2004)。Introduction to Shellcoding,http://tigerteam.se/dl/papers/intro_to_shellcoding.pdf。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE