期刊文献+

基于ARM平台的ROP攻击及防御技术 被引量:3

ROP Attack and Defense Technology based on ARM
原文传递
导出
摘要 随着智能手机领域的发展,几乎所有智能手机及平板电脑都采用了ARM架构,在此平台上的安全问题也越来越受到研究者的关注。X86平台上流行的返回导向编程被引入到了ARM平台上。通过研究总结X86平台上返回导向编程的攻击和防御机制,给出了该攻击移植到ARM平台上的技术细节,包括具体实现方式和gadget搜索算法的差异性,通过自动构建gadgets链加速Exploit开发,最后提出了一种系统库沙盒技术来防御此攻击。 With the development of mobile-phone field, ARM architecture is usually used in the mobile-phone and tablet computer, and the security issues on ARM platform always attract much attention from the researchers. ROP, a popular attack method on X86 is planted into ARM. This paper analyzes the different ROP defense methods on X86, presents the technical details of ROP attack, including specific implementation and gadgets search algorithm on ARM. Finally, a library sandbox technology is suggested to defense this kind of attack and secure the system.
出处 《信息安全与通信保密》 2012年第10期75-77,共3页 Information Security and Communications Privacy
基金 国家自然科学基金资助项目(批准号:61171173)
关键词 返回导向编程 ARM架构 gadget搜索 系统库沙盒 return-oriented programming ARM architecture gadget search library sandbox
  • 相关文献

参考文献7

  • 1陈悦,薛质,王轶骏.针对Shellcode变形规避的NIDS检测技术[J].信息安全与通信保密,2007,29(1):99-103. 被引量:3
  • 2SHACHAM H. The Geometry of Innocent Flesh on the Bone Return-into-libc Without Function Calls(on the x86)[EB/ OL]. (2007-11-20)[2012-4-3]. http: //dl.acm.org/citation. cfm?id=1315313.
  • 3CHECKOWAY S, DAVI L, DMITRIENKO A, et al. Return-oriented Programming Without Returns[C]// Proceedings of the 17^th ACM Conference on Computer and Communications Security. NY: New York, 2010.
  • 4丛欣.ARM处理器在网络安全领域中的应用[J].信息安全与通信保密,2011,9(5):41-42. 被引量:3
  • 5KORNAU T. Return Oriented Programming for the ARM Architecture. Masterthesis[D]. Germany: Ruhr-University Bochum, 2009.
  • 6刘仙艳.移动终端开放平台--Android[J].通信技术,2011,44(4):50-53.
  • 7HUANG ZhiJun, ZHENG Tao, LIU Jia. A Dynamic Detective Method against ROP Attack on ARM Platform[C]//SEES 2012. Zurich, Switzerland: IEEE Publications, 2012:51-57.

二级参考文献7

  • 1[1]Coit J,Levitt K,Pasupulati A.Buttercup:On Network-based Detection of Polymorphic Buffer Overflow Vulnerabilities.Network Operationsand Management Symposium,2004.
  • 2[2]Rix.Writing 1A-32 alphanumeric shellcodes[DB/OL].http://www.phrack.org/p57-0x0f.
  • 3[3]K2.ADMmutate[DB/OL].http://www.ktwo.ca/ADMmutate-0.8.4.tar.gz.
  • 4[4]Fnord D R.Multi-architecture mutated NOP sled detector[DB/OL].Feb.2002.http://www.cansecwest.com/spp_fnord.c.
  • 5[5]Kolesnikov O,Dagon D,Lee W.Advanced polymorphic worms:Evading IDS by blending in with normal traffic[DB/OL].2004.http://www.cc.gatech.edu/?ok/w/ok_pw.pdf.
  • 6[6]NIDSFindShellcode[DB/OL].http://www.ngsec.com/downloads/misc/NIDSfindshellcode.tgz.
  • 7[7]Detristan T,Ulenspiegel T,Malcom Y,et al.Polymorphic Shellcode Engine Using Spectrum Analysis[DB/OL].http://www.phrack.org/show.php?p=61&a=9.

共引文献4

同被引文献10

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部