期刊文献+

基于内存的漏洞缓解关键技术研究

The Research on Vulnerability Mitigation in Memory
下载PDF
导出
摘要 随着漏洞挖掘技术日渐成熟,每年新增漏洞数量逐步增加。从操作系统以及编译器层面来说,为了提高内存保护的安全性,对抗漏洞利用的缓解措施也在不断完善。文章介绍了近年来比较成熟的基于内存的漏洞关键缓解技术,包括GS编译选项技术、SEH安全校验机制、堆数据保护机制、DEP技术以及ASLR技术。GS编译选项技术和SEH安全校验机制能够有效遏制针对栈数据的攻击;堆数据保护机制为堆溢出增加了更多限制;DEP技术能够对内存执行额外检查以防止恶意代码在系统中执行;ASLR技术通过对关键地址的随机化使一些堆栈溢出手段失效。文章还指出了这些防护措施所存在的不足,并据此从攻击者的角度介绍了针对这几种缓解措施的攻击思路。针对漏洞缓解技术,文章指出未来必须考虑的是如何弥补在抵御复合向量攻击方面的不足,如何完善旁路保护。 With the technology of ifnding vulnerabilities in software getting more mature, the total number of bugs is increasing yearly. In order to improve the security of memory protection, in terms of operating system and compiler, measures taken by OS to mitigate exploit are getting more perfect. This article describes some of the key mitigations, including GS options, SEH, Heap protection, DEP, and ASLR. The GS compiler technology and SEH security authentication mechanism can effectively detect and prevent most stack-based overlfow attacks; Heap protection provides more restrictions aiming at stack overlfow; DEP can perform additional memory checks to prevent malicious code executing in the system; ASLR helps to prevent buffer overlfow attacks by randomizing the key address.The article also points out the drawbacks and introduces some method to defeat these mitigations from the views of attackers. Aiming at the vulnerability mitigation technology, the article points out it must be considered how to cover the shortage on resisting the attack of composite vectors and how to improve and perfect the bypassing protection in the future.
出处 《信息网络安全》 2014年第12期76-82,共7页 Netinfo Security
基金 国家自然科学基金[61170282]
关键词 内存安全 漏洞缓解 绕过 memory security vulnerability mitigation bypassing
  • 相关文献

参考文献19

二级参考文献62

  • 1齐雷,谢余强,程东年,舒辉.Win32 SEH异常处理机制分析[J].信息工程大学学报,2004,5(2):49-52. 被引量:3
  • 2[1]Wagle C C,Pu C,Beattie S,et al.Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decade. DARPA Information Survivability Conference and Exposition,2000-01 被引量:1
  • 3[2]McGraw G, Viega J.Make Your Software Behave:Learning the Basics of Buffer Overflows:Get Reacqluainted with the Single Biggest Threat to Sofmare Security. Reliable Software Technologies,2000-03-01 被引量:1
  • 4[3]Aleph One:Smashing the Stack for Fun and Profit. URL:http://www.shmoo.com/phrack/Phrack49/p49-14,1996-11-08 被引量:1
  • 5Advanced heap spraying techniques [Z/OL]. (2010-02-07), https://www. owasp, org/images/0/01/OWASL_IL_2010_ Jan_-_Moshe_Ben_Abu_- Advanced Heapspray. pdf. 被引量:1
  • 6Blazakis D. Interpreter exploitation: Pointer inference and JIT Spraying [Z/OL]. (2010-10-11), http: //www. semantiscope, com/research/BHDC2010/BHDC-2010 Paper. pd{, 2010. 被引量:1
  • 7Ratanaworabhan P, Livshits B, Zorn B. Nozzle: A defense against heap-spraying code injection attacks [C]// Proceedings of the 18th USENIX Security Symposium. Montreal, Canada: USENIX Association, 2009. 被引量:1
  • 8Wahbe R, Lucco S, Anderson T E. Efficient software based fault isolation [J]. Operating System Review, 1993, 27(5) : 203-216. 被引量:1
  • 9Vahdat A, Ghormley D, Anderson T. Efficient, portable, and robust extension of operating system functionality. Technical Report UCB CS 94 842 [R]. Berkeley, USA: Computer Science Division, University of California Berkeley, 1994. 被引量:1
  • 10McCamant S, Morrisett G. Evaluating SFI for a CISC architecture [C]// Proceedings of the 15th USENIX Security Symposium. Vancouver, Canada: USENIX Association, 2006:209 - 224. 被引量:1

共引文献76

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部