期刊文献+

Windows 8安全改进及缺陷研究 被引量:1

Security Improvements and Defects of Windows 8
原文传递
导出
摘要 Windows操作系统作为一种使用广泛的操作系统,其安全机制一直是研究的热点,最新推出的Windows 8在安全机制方面做了很大的提升,更是值得关注。首先从Win8用户态安全、内核态安全和硬件层安全入手,对win8的安全改进情况进行梳理和总结,其次,在此基础上,对可能存在的缺陷提出了绕过思路和相应的防御措施,最后,对未来的研究方向进行了讨论。 Windows operating system is a widely-used operating system, and its security mechanism is always a hot research field. The latest Windows 8 has received great improvement in its security mecha- nism, and thus draws much attention from the people. The article, starting from the security of user mode, kernel mode and hardware layer, combs up and summarizes Windows 8's security improvement. On this basis, this article puts forward some bypass and defensive measures. Finally, it discusses the future research direction.
出处 《信息安全与通信保密》 2013年第11期75-79,共5页 Information Security and Communications Privacy
基金 信息网络安全公安部重点实验室开放课题 "针对Windows 8平台的远程管控技术研究与实现"(编号:C12612)
关键词 WINDOWS 8 系统安全 防护机制 缺陷研究 Windows 8 system security defense mechanism defects research
  • 相关文献

参考文献11

  • 1Dionysus Blazakis. Interpreter Exploitation :Pointer Inference and JIT Spraying [ R ]. Black Hat Federal, 2010.
  • 2CHEN Xiabo, XIE Jun. Defeat Windows 7 Browser Memory Protection [ R]. XCon 2010.
  • 3Derek Soeder. Memory Retrieval Vulnerabil- iYes [ EB/OL]. http: //www. eeye. corn/ eEyeDigitalSecurity/media/ResearchPapers/ eeyeMRV-Oct2006, pdf, 2006.
  • 4张明磊,单蓉胜,李小勇.基于Windows系统调用的异常检测模型[J].信息安全与通信保密,2007,29(11):56-57. 被引量:1
  • 5Ben Hawkes. Attacking the Vista Heap [ EB/ OL ]. http: //www. lateralsecurity, corn/ downloads/hawkes_ ruxcon - nov - 2008. pdf, 2008-11.
  • 6Chris Valasek. Understanding the Low Frag- mentation Heap [ EB/OL ]. http. //illmat- ies. com/Understanding_ the LFH Slides.pdf, July, 2010.
  • 7Tarjei Mandt. Kernel Attacks through User- Mode Callbacks [ R ]. USA, Black Hat, 2011.
  • 8羊建林,周安民.Windows异常处理与软件安全[J].信息安全与通信保密,2011,9(4):58-60. 被引量:6
  • 9马一楠,张立和.Windows下缓冲区溢出保护机制及绕过技术[J].计算机工程,2010,36(17):147-151. 被引量:1
  • 10Chris Valasek, Tarjei Mandt. Windows 8 Heap Internals [ R ]. USA, Black Hat, 2012.

二级参考文献18

  • 1[1]Battistoni R,Gabrielli E,Mancini V.A host intrusion prevention system for Windows operating systems[R].France:9th European Symposium on Research in Computer Security,2004.
  • 2[2]Howard M,LeBlanc D.Writing Secure Code[M].second edition,Microsoft Press,2002.
  • 3Cowan C,Pu C,Maier D,et al.Stackguard:Automatic Detection and Prevention of Buffer-overrun Attacks[C] //Proc.of the 7th USENIX Security Symposium.San Antonio,Texas,USA:[s.n.] ,1998.
  • 4Ashcraft K,Engler D.Using Programmer-written Compiler Extensions to Catch Security Holes[C] //Proc.of IEEE Symposium on Security and Privacy.[S.1.] :IEEE Press,2002:143-159.
  • 5Chiueh T,Hsu F H.RAD:A Compile-time Solution to Buffer Overflow Attacks[C] //Proc.of the 21st IEEE International Conference on Distributed Computing Systems.[S.1.] :IEEE Press,2001.
  • 6Feng H H,Kolesnikov O M,Fogla P,et al.Anomaly Detection Using Call Stack Information[C] //Proc.of IEEE Symposium on Security and Privacy.[S.1.] :IEEE Press,2003:62-75.
  • 7Wagner D,Dean R.Intrusion Detection via Static Analysis[C] //Proc.of IEEE Symposium on Security and Privacy.[S.1.] :IEEE Press,2001:156-168.
  • 8Stojanovski N,Gligoroski D,Knapskog Svein J,et al.Bypassing Data Execution Prevention on Microsoft Windows XP SP2[C] //Proc.of the 2nd International Conference on Availability,Reliability and Security.[S.1.] :IEEE Press,2007:10-13.
  • 9王清.Oday安全软件漏洞分析技术[M].北京:电子工业出版社,2008.
  • 10Biermann E, Cloete E, renter H L. A Comparison of Intrusion Detection Systems [J]. Computers & Security, 2001, (20) :676-683.

共引文献6

同被引文献7

  • 1Wikipedia.Features new to Windows 8[EB/OL].http://en.wikipedi a.org/wiki/Features new to Windows_8,2012.
  • 2Windows 8 Forensics[EB/OL].http://computerforensics.champlain. edu/blog/windows-8-forensics,2012.
  • 3Amanda C.F.Thomson.Windows 8 Forensic Guide[EB/OL].http: //prop ellerheadforensics.files.wordpress.com/2012~05~thomson_ windows-8-forensic-guide2.pdf,2012.
  • 4Windows 8 FileHistory[EB/OL].http://randomthoughtsofforensics. blog spot.hk/search/label/Windows%208,2012.
  • 5Windows 8 typedURLsTime [EB/OL].http://dfstream.blogspot. hk/2012/05/windows-8-typedurlstime.html,2012.
  • 6宋冰.Windows 8回收站取证分析[J].信息安全与技术,2012,3(12):50-52. 被引量:4
  • 7伍坤,张金波,丁典模.Windows8操作系统计算机取证新特性浅析[J].网络安全技术与应用,2014(7):85-86. 被引量:1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部