摘要
针对Word软件在富文本格式(RTF)文档解析的漏洞利用攻击,通过对Word程序的逆向分析,研究其在RTF文档解析中产生缓冲区溢出漏洞的原理,并提出一种基于指令回溯及特征数据构造的漏洞分析方法.通过该方法分析Word漏洞的触发原因、触发点和触发机制,给出了面向RTF文档的缓冲区溢出漏洞的分析流程.实验测试结果证明:该方法能有效检测出Word的RTF文档解析漏洞.
According to vulnerability exploitation attack of Word software parsing RTF document,this paper studies the principle of buffer overflow vulnerabilities of Word program parsing RTF document by using the reverse analysis of the Word program,and proposes a new vulnerability analysis method based on instruction backtracking and characterization data construction.Through proposed method,this paper analyzes the triggering reason,triggering point and triggering mechanism of Word vulnerability.The analysis process of buffer overflow vulnerabilities for facing RTF document is ob-tained.The Experimental testing results show that this method can effectively detect the RTF document parsing vulnera-bility of word.
出处
《华侨大学学报(自然科学版)》
CAS
北大核心
2015年第1期17-22,共6页
Journal of Huaqiao University(Natural Science)
基金
福建省物联网云计算平台建设基金资助项目(2013H2002)
福建省泉州市科技计划项目(2012Z83)
福建省泉州市丰泽区科技计划项目(2013FZ46)
华侨大学高层次人才科研启动项目(12Y0357)
关键词
富文本格式
文档
软件安全
Word漏洞利用
rich text format
document
software security
word vulnerability exploit