期刊文献+

一种杀毒软件升级流程的安全性分析方法 被引量:6

An Security Analysis Method on the Anti-Virus Software Upgrade Process
原文传递
导出
摘要 针对杀毒软件升级中存在的安全风险问题,基于杀毒软件升级流程,提出了一种静态分析与动态分析相结合的杀毒软件升级流程的安全性分析方法.该方法利用网络抓包理清升级的基本流程,通过进程监视获得升级文件信息,采用静态分析方法理解升级代码,用动态调试确认升级流程存在的安全问题,定位漏洞.运用该方法对百度杀毒、金山毒霸、瑞星、360杀毒这四款国内常用杀毒软件的升级流程进行分析,发现其中存在密钥泄露、校验逻辑泄露等漏洞,通过中间人攻击证实了这些漏洞的存在.同时,本文提出了加强DNS防护,SSL协议加密、对网络传输的明文数据进行签名以及对升级前后的文件进行数字签名等安全加固建议. This paper presents a hybrid security analysis method on the anti-virus software upgrade process.Though exploiting the network packet interception,monitoring system,static analysis to get useful information for the sake of dynamic analysis,the anti-virus software upgrade process will be analyzed clearly and the vulnerabilities may be located.Both vulnerabilities of key compromise and invalid validation logic in four pieces of common anti-virus software has been located with this method,and these results prove its efficiency.Finally the security proposals are presented,such as DNS protection,SSL protocol encryption,network data signature and file digital signature.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2015年第6期509-516,共8页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目(61373168 61202387)
关键词 软件安全 杀毒软件 恶意代码 中间人攻击 数字签名 software security anti-virus software malware manin the middle digital signature
  • 相关文献

参考文献15

  • 1Alvarez S, Zoller T. The death of A V defense in depth? -revisiting anti-virus software[DB/OL].[2015- 5-13]. http://cansecwest. com/ csw08/ csw08-alvarez. pdf. 被引量:1
  • 2Porst S. How to really obfuscate your PDF malware[DB/OL].[2015-5-13]. http://recon. cx/2010/ slides/ recon_20 1 O_sebastian_porst. pdf. 被引量:1
  • 3Jana S, Shmatikov V. Abusing file processing in malware detectors for fun and profit[C]/ / Security and Privacy (SP), 2012 IEEE Symposium on. Piscataway: IEEE, 2012: 80-94. 被引量:1
  • 4KoretJ. Breaking AV Software[DB/OL].[2015-5- 13]. https://www. syscan360. org/ slides/2014 _ZH_ BreakingA VSoftware_l oxeanKoret. pdf. 被引量:1
  • 5徐学洲,任声骏.软件更新安全解决方案研究[J].大连理工大学学报,2005,45(z1):161-165. 被引量:3
  • 6Bellissimo A, BurgessJ, Fu K. Secure software updates: Disappointments and new challenges[DB/OL].[2015-5-13]. https://www. usenix. org/legacy/event/ hotsec06/ tech/ full papers/ bellissimo/ bell issimo. pd f,. 被引量:1
  • 7Min B, Varadharajan V, Tupakula U, etal. Antivirus security: naked during updates[J]. Software: Practiceand Eic perience , 2014,44(10): 1201-1222. 被引量:1
  • 8汤玮..反病毒软件升级后台管理系统的设计与实现[D].南京大学,2011:
  • 9孙亚京..TM反病毒软件服务器增量升级的设计与实现[D].南京大学,2012:
  • 10Microsoft Corporation. Microsoft security bulletin M01-017[EB/OL].[2015-5-13]. http://www.microso ft. com/ technet/ security/ bulletin/ MSO 1- 0 17. ms p.c,. 被引量:1

二级参考文献9

  • 1[1]JANSEN S, BALLINTIJN G, BRINKKEMPER S. A process model and typology for software product updaters[A]. CSMR 2005 Proceedings[C]. Manchester: IEEE Computer Society Press, 2005:265-274. 被引量:1
  • 2[2]DEVANBU P, GERTZ M, STUBBLEBINE S. Security for automated, distributed configuration management[A]. Proceedings of the 1999 International Conference on Software Engineering[C]. Los Angeles: ACM, 1999. 被引量:1
  • 3[3]ADI W, AL-QAYEDI A, NEGM K. Secured mobile device software update over IP networks[A]. IEEE SoutheastCon 2004 [C] Greensboro:IEEE, 2004:271-274. 被引量:1
  • 4[4]HILLENBRAND M, MLLER P, MIHAJLOSKI K. A software deployment service for autonomous computing environments[A]. International Conference on Intelligent Commerce - IAWTIC 2004[C]. Australia: University of Canberra, 2004. 被引量:1
  • 5[5]HALL R, HEIMBIGNER D, WOLF A. A cooperative approach to support software deployment using the software dock[A]. Proceedings of the 1999 International Conference on Software Engineering[C]. Los Angeles: ACM, 1999:174-183. 被引量:1
  • 6[6]SCHNEINER B. 应用密码学[M]. 北京:机械工业出版社, 2000. 被引量:1
  • 7[7]THORSTEINSON P, GANESH G.NET安全性与密码术[M]. 北京:清华大学出版社, 2004. 被引量:1
  • 8[8]Web Services Enhancements 2.0 for Microsoft .NET. Documentation[S].[S.l.]:Microsoft Corporation, 2004. 被引量:1
  • 9[9]Web Services Security v1.0[S]. [S.l.]: OASIS, 2004. 被引量:1

共引文献2

同被引文献28

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部