期刊文献+

面向RTF文件的Word漏洞分析 被引量:3

Research on Word Vulnerability Analysis for the RTF File
下载PDF
导出
摘要 针对Word软件在富文本格式(RTF)文档解析的漏洞利用攻击,通过对Word程序的逆向分析,研究其在RTF文档解析中产生缓冲区溢出漏洞的原理,并提出一种基于指令回溯及特征数据构造的漏洞分析方法.通过该方法分析Word漏洞的触发原因、触发点和触发机制,给出了面向RTF文档的缓冲区溢出漏洞的分析流程.实验测试结果证明:该方法能有效检测出Word的RTF文档解析漏洞. According to vulnerability exploitation attack of Word software parsing RTF document,this paper studies the principle of buffer overflow vulnerabilities of Word program parsing RTF document by using the reverse analysis of the Word program,and proposes a new vulnerability analysis method based on instruction backtracking and characterization data construction.Through proposed method,this paper analyzes the triggering reason,triggering point and triggering mechanism of Word vulnerability.The analysis process of buffer overflow vulnerabilities for facing RTF document is ob-tained.The Experimental testing results show that this method can effectively detect the RTF document parsing vulnera-bility of word.
出处 《华侨大学学报(自然科学版)》 CAS 北大核心 2015年第1期17-22,共6页 Journal of Huaqiao University(Natural Science)
基金 福建省物联网云计算平台建设基金资助项目(2013H2002) 福建省泉州市科技计划项目(2012Z83) 福建省泉州市丰泽区科技计划项目(2013FZ46) 华侨大学高层次人才科研启动项目(12Y0357)
关键词 富文本格式 文档 软件安全 Word漏洞利用 rich text format document software security word vulnerability exploit
  • 相关文献

参考文献12

  • 1KUHN R, JOHNSON C. Vulnerability trends: Measuring progress[J]. IT Professional, 2010,12 ( 4 ): 51-53.
  • 2史飞悦,傅德胜.缓冲区溢出漏洞挖掘分析及利用的研究[J].计算机科学,2013,40(11):143-146. 被引量:7
  • 3陈恺,冯登国,苏璞睿.基于有限约束满足问题的溢出漏洞动态检测方法[J].计算机学报,2012,35(5):898-909. 被引量:10
  • 4高志伟,姚尧,饶飞,刘延钊,罗平.基于漏洞严重程度分类的漏洞预测模型[J].电子学报,2013,41(9):1784-1787. 被引量:10
  • 5Microsoft CorporatiorL Rich Text Format (RTF) Specification[EB/OL]. [2014-10-08]. http://msdn, microsoft. com/en-us/library/aa140277(office. 10). aspx.
  • 6李毅超,刘丹,韩宏,卢显良.缓冲区溢出漏洞研究与进展[J].计算机科学,2008,35(1):87-89. 被引量:11
  • 7CHANG Yung-yu, ZAVARSKY P, RUHL R, et al. Trend analysis of the CVE for software vulnerability manage- ment[C]//Proceedings of IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT) and IEEE Third Inernational Conference on Social Computing (Socialcom). Boston: Institute of Electrical and Elec- tronic Engineers,2011 : 1290-1293.
  • 8HUANG Shih-Kun, HUANG Min-Hsiang, HUANG Po-Yen, et al. Software crash analysis for automatic exploit generation on binary programs[J]. IEEE Transactions on Reliability, 2014,63 (1) : 270,289.
  • 9葛毅,茅兵,谢立.基于内存更新记录的漏洞攻击错误定位方法[J].计算机科学,2009,36(1):252-255. 被引量:2
  • 10FATAUER T S,KHATI'AB S, OMARA F A. OverCovert: Using stack-overflow software vulnerability to create a covert channel[C]//Proceedings of IEEE 4th IFIP International Conference on New Technologies, Mobility and Security. Paris: Institute of Electrical and Electronic Engineers, 2011 : 1-5.

二级参考文献114

共引文献43

同被引文献11

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部