期刊文献+

自动化漏洞利用研究进展 被引量:1

Research Progress of Automated Exploitation
下载PDF
导出
摘要 网络空间安全斗争形式日趋复杂,针对软件安全的攻防博弈愈演愈烈。软件漏洞挖掘与利用的复杂性及专业性,使得大量工作仅能依靠安全专家完成。近年来,漏洞数量激增,仅依靠安全专家已无法有效应对。自动化漏洞利用应运而生,该方法在提升工作效率的同时降低人力成本,并一定程度上满足了自动化攻防的迫切需求。介绍自动化漏洞利用相关概念,对关键技术进行归纳与总结,梳理国内外主流的自动化漏洞利用系统。 The situation of cyberspace security is becoming more and more complex,and the offensive and defensive game against software security is intensifying.The complexity and technical of software vulnerability mining and exploitation make a lot of work only rely on security experts to complete.In recent years,the number of vulnerabilities has soared,and it has been impossible to respond effectively by means of manual means.Automated exploitation have emerged.This method reduces labor costs while improving work efficiency and meets the urgent need for automated attack and defense.Introduces the concept of automated exploitation;generalizes and summarizes the key technologies;sorts out the mainstream automated exploit systems at home and abroad.
作者 靳宪龙 黄雅娟 JIN Xian-long;HUANG Ya-juan(College of Computer Science,Sichuan University,Chengdu 610065;School of Graduate,National University of Defense Technology,Nanjing 210012)
出处 《现代计算机》 2019年第31期15-20,共6页 Modern Computer
关键词 网络安全 二进制 漏洞利用 自动化 Network Security Binary Exploit Automation
  • 相关文献

参考文献3

二级参考文献8

  • 1C.Miller, J.Caballero, N.M.Johnson, M.G.Kang, S.McCamanl, P.Poosankam and D.Song. Crash AflIllYSJ:i with HI/Blaze. BlackHat, 2010. 被引量:1
  • 2S.HeeJan and D.Kroening. Automatic Cenerotion of Control Flow Hi'lJcl(/ilg Explo.its for Software Vu/nera.hJlilies. MSc Computer Science Dissertation, University of Oxford, 2009. 被引量:1
  • 3D.Brumley, P.Poosankam, D.song and J.Zheng. A utometrc Patch-Based Exploi/ Genera/ion is Possible: Techniques and Implications. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2008. 被引量:1
  • 4T.Avgerinos, S.K.Cha, RL.T.Tao and D.Brumley.AEC: Automstic Explo.it Geoereuon, In Proceedings of the Network and Distributed System Security Symposium (NDSS), 20 II. 被引量:1
  • 5S.K.Cha, T.Avgerinos, A.Rebert and D.BrumJey. Ullleashing ,If A YHJ:,'A{ 011 Hinary Code. In Proceedings of the IEEE: Symposium on Security and Privacy (S&P). 2012. 被引量:1
  • 6M.H.Wang, P.R.Su, Q.Li, L.Y.Ying, Y.Yang and D.G.Peng. Automatic Polymorphic Exploit Generation for Software Vulnerabilities. In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm),2013. 被引量:1
  • 7Ecl.Schwarte. T.Avgerinos and D.Brumley. Q: ExplOIt hardening made easy. In Proceedings of the USENIX Security Symposium, 2011. 被引量:1
  • 8H.Hu, Z.L.Chua, S.Adrian, P.Saxena and Z.K.Liang. Aut omet ic Gencrsrion of Data-Oriented Exploits. l n Proceedings of the USENIX Security Symposium, 2015. 被引量:1

共引文献101

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部