期刊文献+

基于FUZZING测试技术的Windows内核安全漏洞挖掘方法研究及应用 被引量:4

Based on the FUZZING Lead to a New Mining Method Based on Windows Kernel Vulnerability
下载PDF
导出
摘要 随着技术的进步,Windows操作系统日益完善,多种内存保护技术的结合使得传统的基于缓冲区溢出攻击越来越困难,在这种情况下,内核漏洞往往可以作为突破安全防线的切入点。该论文首先分析了现有Windows内核漏洞挖掘方法,阐述了Windows内核下进行Fuzzing测试的原理和步骤,针对Windows win32k.sys对窗口消息的处理、第三方驱动程序对IoControlCode的处理、安全软件对SSDT、ShadowSSDT函数的处理,确定数据输入路径,挖掘出多个内核漏洞,验证了该方法的有效性。 With advances in technology, Windows operating system has improved steadily. Combining many memory protection technologies made the traditional buffer-overflow-based attacks to be more useless. In this case, the kernel vulnerability can be used to break through the security line of defense as a starting point. This paper researches the existing mining Windows kernel vulnerability, then proposes a methods on how to find Windows kernel vulnerability based on Fuzzing, summarizes the existing Fuzzing technology, selects three kernel Fuzzing goal which are Windows win32k.sys processing of window messages, third-party driver for IoControlCode processing, security software on the SSDT, ShadowSSDT function of processing, after the analysis of the three principles, Fuzzing data are designed and data input path are identified. Finally, using this method found in case of Windows operating system unknown vulnerabilities verify the validity of the method.
出处 《信息网络安全》 2011年第12期9-16,共8页 Netinfo Security
基金 国家自然科学基金资助项目[61170282]
关键词 安全漏洞 漏洞挖掘 漏洞补丁 security vulnerabilities digging vulnerabilities vulnerability patches
  • 相关文献

参考文献3

  • 1Ben Nagy. Generic Anti Exploitation Technology for Windows[EB/ OL]. http://download.csdn.net/detail/TO_YGY/334441, 2008 01 14/2011-11-11.
  • 2Haroon Meer. The Complete History of Memory Corruption Attacks[C]. BlackHat Confidence USA, 2010.
  • 3David Litchfield. Buffer Underruns, DEP, ASLR and improving the Exploita6on Prevention Mechanisms (XPMs) on the Windows platfonn[EB/ ol]..http://wenku.baidu.com/view/eb293e4d2b160b4e767fcf72.html, 2005-09-30/2011-11-11.

同被引文献32

  • 1CHOI Y H, KIM H C, LEE D H. Tag-aware text file testing for security of a software system[A]. Procedings of International Conference on Convergence Information Technology[C]. IEEE Press, 2007.2254-2259.
  • 2LIU Q X, ZHANG Y Q. TFTP vulnerability finding technique based on fuzzing[J]. Computer Communications. Elsevier, 2008. 31(14): 3420-3426.
  • 3GODEFROID P, KLARLUND N, SEN K. DART: directed automated random testing[A]. Proce of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation[C]. 2005.40-6.
  • 4FROID P G- EVIN L M Y D, et al. Automated whitebox fuzz test- ing[A]. Procof Network and Distributed Systems Security(NDSS)[C]. 2008. 151-166.
  • 5WANG T L, WEI T, GU G E et al. TaintScope: a Checksum-aware directed fuzzing tool for automatic software vulnerability detection[A] The 31st IEEE Symposium on Security and Privacy[C]. Berkeley, California, USA, 2010.
  • 6DEMOTT J, ENBODY R, PUNCH B. Revolutionizing the field of grey-box attack surface testing with evolutionary Fuzzing[EB/OL]. http://www.b mott, 2012. usa-07/bh-usa-07-speakers.html#De.
  • 7COELLO C A, LAMONT G B, VELDHUIZEN A V. Evolutionary Algorithms for Solving Multi-Objective Problems[M]. New York: Springer-Verlag, 2007.
  • 8SPARKS S, EMBLETON S, et al. Automated vulnerability analysis: leveraging control flow for evolutionary input crafting[A]. Proc of Computer Security Applications Conference[C]. 2007.477-486.
  • 9DALLMEIER V, KNOPP N, MALLON C, et al. Automatically generating test cases for specification mining[J]. IEEE Transactions on Software Engineering, 2012.38(2):243-257.
  • 10KANG M G- MCCAMANT S, POOSANKAM P, el al. DTA++: dynamic taint analysis with targeted control-flow ,propagation[A]. Network and Distributed Systems Security(NDSS)[C]. 2011.

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部