期刊文献+

Windows内存防护机制及其脆弱性分析 被引量:2

Title. Analysis of Memory Protections and Vulnerabilities in Windows
下载PDF
导出
摘要 内存溢出漏洞及其利用对计算机和网络安全构成了极大威胁。逐一分析Windows系统对栈、堆防护机制、数据执行保护和地址随机加载机制的设计和实现,测试了Windows Vista环境下绕过这些防护机制方法的可能性,指出无安全编译的软件使用已成为系统安全的短板;最后讨论了更全面提高系统安全性的改进方案。 Memory corruption vulnerabilities and exploitations have threaten the computer systerm and network sercurity very seriously. The search analysed the design and implementation of the memory protections in Windows, such as GS, SafeSEH, DEP, and ASLR. Then the testing of bypassing the protection mechanisms in Windows Vista pointed out the danger of using no_safe_compiled software. At last several measures were introduced to improve system security more complehensively.
作者 吴优雅 高丰
出处 《计算机安全》 2009年第7期1-3,10,共4页 Network & Computer Security
基金 国家863基金资助项目2003AA146010
关键词 VISTA 内存防护机制 脆弱性 数据执行保护 地址随机加载机制 vista Memory Protections vulnerability DEP ASLR
  • 相关文献

参考文献1

二级参考文献7

  • 1Nergal. The Advanced Return-into-Lib (c) Exploits[M]. Phrack, 2001.
  • 2Whitehouse O, An Analysis of Address Space Layout Randomization on Windows Vista['M]. Symantec, 2007.
  • 3Nagy B. SEH (Structured Exception Handling) Security Changes in XP SP2 and 2003 SP1[Z]. eEye Digital Security, 2006.
  • 4Whitehouse O. Analysis of GS Protections in Windows Vista [M]. Syrnantec, 2007.
  • 5Microsoft. Run-Time Library Reference - __Security_init_Cookie[EB/OL]. http://msdn2. microsoft. com/en-us/library/ms235362(VS.80). aspx,2007-01.
  • 6Anonymous. Once upon a Free[M]. Phraek, 2001.
  • 7Kaempf M. Vudo Malloc Tricks[M]. Phrack, 2001.

共引文献8

同被引文献12

  • 1许烁娜,吴锐珍.Windows Vista的安全性分析[J].计算机与现代化,2007(5):50-52. 被引量:2
  • 2Mark Russinovich.User account control inside Windows 7 user account control[EB/OL].http://technet.microsoft.com/en-us/ magazine/2009.07.uac.aspx? rss_fdn=TNTopNewInfo,2009.
  • 3Long Zheng.UAC in Windows 7 still broken,Microsoft won't/ can't fix code-injection vulnerability[EB/OL].http://www.istartedsomething.com/20090611/nac-in-Windows-7-still-broken-microsoft-wont-fix-code-injection-vulnerability/,2009.
  • 4Matthew Conover.Principal security researcher,symantec corpotation,analysis of the Windows Vista security model[EB/OL].http://www.symantec.com/avcenter/re ference/Windows_Vista_ Seeurity_Model_Analysis.pdf,2006.
  • 5Windows 7 VS Windows Vista:The UAC Benchmark[EB/OL].http://www.vista123.net/content/Windows-7-vs-Windows-vista-uac-benchmark,2009.
  • 6Vista UAC secure desktop explained[EB/OL].http://cybernetnews.com/vista-uac-secure-desktop-explained/,2009.
  • 7Su Yong Kim,Dong Hyun Lee,Do Hoon Lee.Vista and activeX control.[C].Proceedings of Black Hat 2008 USA Conference,2008.
  • 8Robert Paveza.User-prompted elevation of unintended code in Windows Vista[EB/OL].http://robpaveza.net/vistaUACExploit/ UACExploitWhitepaper.pdf,2007.
  • 9Windows 7 VS Windows Vista:The UAC Benchmatk. http://www.vistal.23.net/content/Windows-7-VS-Windows-vis-ta-uacbenchmar L . 2009
  • 10马良缘.关于Windows7的用户账户控制(UAC)的全解析[J].网络与信息,2009(12):53-53. 被引量:1

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部