期刊文献+

基于代码重用的漏洞利用及其防御技术研究

Code Reuse Exploit and Its Defense Technology Research
下载PDF
导出
摘要 代码重用漏洞利用技术是突破DEP和WX的主流技术,其灵巧的攻击思想是现行漏洞利用技术的重要方向。因此研究基于代码重用漏洞利用技术及其防御方法,对提升程序安全和系统安全有着重要意义。论文将阐述基于代码重用的攻击原理和主要方法以及各种方法的优缺点和约束条件,总结当前主流防御技术的优缺点,并对下一步研究工作提出展望。 Thecode reuseattack is the mainstream technology to breakDEP and W+X, its smart ideas is an important direction of the current exploit technology. Therefore, it is significant to study the technology of code reuse and its defense, which is of great significance to improve the safety and security of the system. The principle and main method of code reuse attack and the advantages, disadvantages of various methods, the constraints are described. This article will Summarize the advantages and disadvantages of the current mainstream defense technology, and put forward the prospect of the next research work.
出处 《网络空间安全》 2016年第5期20-24,36,共6页 Cyberspace Security
基金 "中国科学院信息安全国家重点实验室开放课题基金"(课题名称:Linux系统漏洞利用与远程控制技术)
关键词 代码重用 W+X 数据执行保护 ROP ANDROID code reuse w+x dep rop
  • 相关文献

参考文献2

二级参考文献39

  • 1BryantRE,0’HallaronDR,龚奕利,雷迎春译.深入理解计算机系统(第2版)[M].北京:机械工业出版社,2010.
  • 2Designer S. StackPatch[EB/OL]. http://www. opwnwall. com/ linux.
  • 3Documentation for the PaX [EB/OL]. Project: http://pax. grsecurity. net/docs/.
  • 4PaX non-executable pages design & implementation[EB/OL], http://pax. grsecurity. net/docs/noexec.txt.
  • 5Return-to-libc Attack Lab[EB/OL]. http..//www, cis. syr. edu/ -wedu/seed/Labs/Vulnerability/Return_to_libc/Return_to_libc. pdf.
  • 6Advanced return-into-lib(c) exploits (PaX case study) [EB/ OL]. http://www. phrack. org/issues. html? issue= 58&id= 4 &mode= txt.
  • 7Shacham H. The Geometry of Innocent Flesh on the Bone:Retum-into-libc without Function Calls(on the x86)[C]//CCS'07 Proceedings of the 14th ACM conference on computer and communications security, 2007. New York, NY, USA.. ACM, 2007 : 552-561.
  • 8Buchanan E, Roemer R, Shacham H. When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC [C]//CCS' 08 Proceedings of the 15th ACM Conference on Computer and communications security, 2008. New York, NY, USA: ACM, 2008: 27-38.
  • 9Turing A M. On Computer Numbers, with an application the Entscheifungs problem, 1936.
  • 10Hund R, Holz T, Freiling F C. Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms[C]//SSYM' 09 Proceedings of the 18th conference on USENIX security symposium,2009. CA, USA: USENIX Association Berkeley, 2009: 383-398.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部