期刊文献+

基于异常控制流识别的漏洞利用攻击检测方法 被引量:9

Exploit detection based on illegal control flow transfers identification
下载PDF
导出
摘要 为应对APT等漏洞利用攻击的问题,提出了一种基于异常控制流识别的漏洞利用攻击检测方法。该方法通过对目标程序的静态分析和动态执行监测,构建完整的安全执行轮廓,并限定控制流转移的合法目标,在函数调用、函数返回和跳转进行控制流转移时,检查目标地址的合法性,将异常控制流转移判定为漏洞攻击,并捕获完整的攻击步骤。实验结果表明,该方法能够准确检测到漏洞利用攻击,并具备良好的运行效率,可以作为漏洞利用攻击的实时检测方案。 In order to deal with exploit attacks such as APT,an approach was proposed to detect exploits based on illegal control flow transfers identification.Both static and dynamic analysis methods were performed to construct the CFSO (control flow safety outline),which was used to restrict the targets of control flow transfers occurred during the target program's running.When a call/ret/jmp was about to execute,the target was checked according to the CFSO.The illegal control flow transfer is considered as an exploit attack and all the following attacking steps could be captured.The experiment also showed that proposed method had decent overhead and could be applied to detect exploits online.
出处 《通信学报》 EI CSCD 北大核心 2014年第9期20-31,共12页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(2012CB315804) 国家自然科学基金资助项目(91118006) 北京市自然科学基金资助项目(4122086)~~
关键词 软件漏洞 漏洞利用 攻击检测 地址随机化 数据执行保护 software vulnerability exploit attack detection address space layout randomization data execution protection
  • 相关文献

参考文献20

  • 1Secunia[EBOL].http://secuina.com/vulnerability-review/.2014.
  • 2ABADI M,MIHAIBUDIU,ERLINGSSON U.Control-flow integrity[A].Proceedings of the 12th ACM conference on Computer and Communications Security[C].Raleigh,NC,USA,2005.340-353.
  • 3BOSMAN E,SLOWINSKA A,BOSH.Minemu:the world's fastest taint tracker[J].Recent Advances in lntrusion Detection,2011,6961:1-20.
  • 4NEWSOME J,SONG D.Dynamic taint analysis for automatic detection,analysis,and signature generation of exploits on commodity software[A].Network and Distributed System Security Symposium[C].San Diego,California,USA:Internet Society,2005.
  • 5SCHWARTZ E L,AVGERINOS T,BRUMLEY D.All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)[A].IEEE Symposium on Security and Privacy[C].Oakland,CA,USA,2010.317-331.
  • 6FireEye[EB/OL].http://www.fireeye.com/.2014.
  • 7Argos[EB/OL].http://www.few.vu.nl/argos/.2014.
  • 8PORTOKALIDIS G,SLOWINSKA A,BOS H.Argos:an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation[J].Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006[C].New York,NY,USA:ACM,2006.15-27.
  • 9YIN H,SONG D,EGELE M.Capturing system-wide information flow for malware detection and analysis[A].Proceeding of the 14th ACM Conference of Computer and Communication Security[C].Alexandria,VA,USA,2007.116-127.
  • 10ZHANG M W,SEKAR R.Control flow integrity for COTS binaries[A].Proceedings of the 22nd USENIX Conference on Security 2013[C].Berkeley,CA,USA,2013.

同被引文献43

  • 1韩妍妍,何彦茹,刘培鹤,任慧,张锦圣.基于爬虫的XSS漏洞检测工具设计与实现[J].北京电子科技学院学报,2019,0(1):7-16. 被引量:1
  • 2王思琪,缪思薇,张小玲,石志强,卢新岱.基于D-S证据理论的嵌入式固件Web代码静态漏洞检测技术[J].北京邮电大学学报,2019,42(5):91-99. 被引量:3
  • 3RODRIGUEZ C, MARTINEZ R. The growing hacking threat to websites: an ongoing commitment to web applica- tion searit [ R/OL] . ( 2012 -09 -05) [ 2015 -12 -04] https: //www.htbridge.com/blog/the growing hacking threat to websites an ongoing commitment_towebapplication_ sewrity.html. CENZIC Corporation.
  • 4Cenzic application security trends re- port 2014 [R/OL] . (2014-11-01) [2015-12-04] http: //www.cenzic.com/downloads/Cenzic_Vulnerability _Report_2014.vdf.
  • 5TESTA, ALBERTO Gustavo Solino. System and method for providing application penetration testing: U S 8484738[P/ OL]. 2013 -07 -09 [2015 -12 -04]https :www.google.com/ patents~US 8484738.
  • 6COTRONEO, Domenico. Innovative technologies for De- pendable OTS-based critical systems [ M] Berlin: Springer, 2013: 145-157.
  • 7NILSOM G, WILLS K, STUCKMAN J, et ol. BugBox: A vulnerability corpus for PHP Web applications [C] //(;SET, 2013.
  • 8SAJJADI, S M S, POUR BT. Study of SQL injection at- tacks and countermeasures [ J] . International Journal of Computer and Communication Engineering, 2013, 2 (5) : 539-542.
  • 9刘萍,刘燕兵,郭莉,方滨兴.串匹配算法中模式串与文本之间关系的研究[J].软件学报,2010,21(7):1503-1514. 被引量:16
  • 10杨丁宁,肖晖,张玉清.基于Fuzzing的ActiveX控件漏洞挖掘技术研究[J].计算机研究与发展,2012,49(7):1525-1532. 被引量:10

引证文献9

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部