期刊文献+

Windows平台下地址空间分布随机化技术研究及实现 被引量:2

ON RANDOMISATION OF ADDRESS SPACE LAYOUT ON WINDOWS PLATFORM AND ITS IMPLEMENTATION
下载PDF
导出
摘要 使用不安全语言编写的程序容易受到诸如缓冲区溢出等攻击。这些攻击成功与否取决于对进程组件地址的分布是否熟悉。因此,防御内存攻击的一个对策就是随机化进程组件位置。地址空间分布随机化就是实现进程组件地址随机化的一个方法。分析了Windows Vista操作系统采用的地址空间分布随机化的优点与不足之处,并提出了在Windows XP操作系统上实现地址随机化的简易方案。 The programs written with unsafe languages are likely to be attacked by buffer overflows,etc.Since the success of these attacks depends on whether the address layout of the process components is familiar with or not,therefore a countermeasure of memory attacks defending is to randomise the locations of the process components.Address space layout randomisation is an approach for achieving randomisation of the process components addresses.In this paper we analyse the advantages and disadvantages of address space layout randomisation used by the Windows Vista operating system,and present a simplified solution for implementing the address randomisation on Windows XP operating system.
出处 《计算机应用与软件》 CSCD 2011年第4期117-119,158,共4页 Computer Applications and Software
基金 国家高技术研究发展计划项目(2007AA01Z483)
关键词 地址空间分布 随机化 缓冲区溢出 Address space layout Randomisation Buffer overflow
  • 相关文献

参考文献5

  • 1王清.0 day安全:软件漏洞分析技术[M].北京:电子工业出版社,2008:62-70.
  • 2陈扬,祝跃飞,梅强.Windows Vista的栈保护机制[J].计算机工程,2008,34(22):182-183. 被引量:3
  • 3罗宇翔,梁洪亮.FreeBSD的地址空间随机化[J].计算机应用与软件,2008,25(6):1-2. 被引量:1
  • 4Alexander Sotirov, Mark Dowd. Bypassing Browser Memory Protections [ EB ]. http ://taossa. com/archive/bhOSsotirovdowd, pdf.
  • 5何子昂.轻量组缓冲区溢出防护技术研究[D].成都:电子科技大学.2004.

二级参考文献11

  • 1Whitehouse O. Analysis of GS Protections in Microsoft Windows Vista[EB/OL]. (2007-03-30). http://www.symantec.com/avcenter/ reference/GS Protections in Vista.pdf.
  • 2Russinovich M E, Solomon D A. Microsoft Windows Internals, Fourth Edition: Microsoft Windows Server 2003, Windows XP, and Windows 2000[M]. [S.l.]: Microsoft Press, 2004.
  • 3Whitehouse O. An Analysis of Address Space Layout Randomization on Windows Vista[EB/OL]. (2007-02-22). http://www.symantee. com/avcenter/reference/Address_Space_ Layout_Randomization.pdf.
  • 4Microsoft Windows动画光标畸形ANI头结构远程栈溢出漏洞(MS07-017)[EB/OL]. (2007-04-03). http://www.nsfocus.net/vulndb/ 10120.
  • 5Cowan C, Wagle P, Pu C, et al. Buffer Overflows: Attacks and Defenses for the Vulnerabili-ty of the Decade [ EB/OL ]. http ://www. cse. ogi. edu/DISC/projects/immunix/discex00. pdf. 2000-1.
  • 6Perry Wagle, Crispin Cowan. StackGuard: Simple Stack Smash Protection for GCC. http ://gcc. fyxm. net/summit/2003/Stackguard. pdf.
  • 7Vendicator. Stack Shield. http://www. angelfire. com/sk/stackshield/. January 7 2000.
  • 8ExecShield. http ://people. redhat. com/mingo/exec-shield/.
  • 9PAX. http ://pax. grsecurity. net/.
  • 10Gaurav S Kc, Angelos D Keroraytis, Vassilis Prevelakis. Countering code-injection attacks with instruction-set randomization. Proceedings of the 10th ACM conference on Computer and communications security, October 27 - 30, 2003, Washington D. C. , USA.

共引文献2

同被引文献23

  • 1张慧琳,诸葛建伟,宋程昱,韩心慧,邹维.基于网页动态视图的网页木马检测方法[J].清华大学学报(自然科学版),2009(S2):2126-2132. 被引量:8
  • 2王海峰,段友祥,刘仁宁.基于行为分析的病毒检测引擎的改良研究[J].计算机应用,2004,24(B12):109-110. 被引量:12
  • 3卓继亮,李先贤,李建欣,怀进鹏.安全协议的攻击分类及其安全性评估[J].计算机研究与发展,2005,42(7):1100-1107. 被引量:16
  • 4Day O, Palmen B , Greenstadt R. Reinterpreting the disclosure debate for web infections [C]/ / Proc Seventh Workshop on the Economics of Information Security (WEIS2008) . Hanover , New Hampshire , June 2008.
  • 5PhantomJS.Cloud[EB/OL].https://phantomjscloud.com/site/index. html, 2013-08-13.
  • 6ProjectShelloce.ShellocdeTutorials [EB/OL].http:// projectshellcode. com/?q=/1327,2012-04-08.
  • 7Thomas J,Hughes R.Implicit-explicit finite elements in nonlinear transient analysis[J].Computer methods in Applied Mechanics and Engineering, 1987,(45):371-378.
  • 8BOYER R S,MOORE J S.A fast string searching algorithm[J]. Communications of ACM,1977,20(10):762-772.
  • 9开源社区.The Honeynet Project[EB/OL].http://www.honeynet.org/taxonomy/term/57,2009-10-08.
  • 10李琴,曾凡平.RC4密码的改进方法及其性能分析[J].计算机工程,2008,34(18):181-183. 被引量:7

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部