期刊文献+

Windows 7操作系统关键内存防攻击研究 被引量:3

Research on Key Memory Attack Windows 7 Operating System
下载PDF
导出
摘要 GS Stack Protection、SafeSEH、Heap Protection、DEP、ASLR技术是Windows7操作系统内存保护机制的关键技术,这五种技术对缓解缓冲区溢出攻击起到显著作用。文章以对Windows7的内存保护机制的原理分析为基础,测试了Windows7环境下绕过这些保护机制的可能性;最后对Windows7内存保护机制抵御缓冲区溢出攻击的整体效果进行了分析,指出Windows7仍然不能完全抵御缓冲区溢出攻击,并讨论了更全面提高系统安全性的改进方案。 GS Stack Protection,SafeSEH,Heap Protection,DEP,ASLR are five key technologies for the memory protection mechanism of Windows 7,these technologies significantly contribute to mitigate buffer overflow attacks.Based on the analysis of these technologies,we also tested the possibility of bypassing the protection mechanisms in Windows 7.Evaluating the effect of resisting buffer overflow of Windows 7,we pointed out that Windows 7 couldn't resist the buffer overflow attacks absolutely.Finally several measures were introduced to improve system security more comprehensively.
出处 《信息网络安全》 2011年第7期38-41,共4页 Netinfo Security
关键词 WINDOWS7 内存保护机制 GS SafeSEH DEP ASLR HEAP PROTECTION Windows 7 memory protection GS SafeSEH DEP ASLR Heap Protection
  • 相关文献

参考文献7

  • 1SOTIP,.OV. A, DOWD M. Bypassing browser memory protections[C]. 2008.
  • 2Michael Howard. Protecting Your Code with Visual C++ Defenses. http://msdn.microsoft.com/en-us/magazine/cc337897.aspx#S1.
  • 3Richard Johnson. Windows Vista Exploitation Countermeasures. Microsoft. 2006.
  • 4Matt Miller. Preventing the Exploitation of SEH Overwrites. http:// www.uninformed.org/?v=S&a=2&t=pdf, September 2006.
  • 5Wikipedia. http://en.wikipedia.org/wiki/Data_Execution_Prevention.
  • 6skape, Skywing. Bypassing Windows Hardware-enforced Data Execution Prevention. http://www.uninformed, org/?v=2&a=4&t=txt.
  • 7Ollie Whitehouse. An Analysis of Address Space Layout Randomization on Windows Vista. Symantec, 2007.

同被引文献27

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部