期刊文献+

融合多种技术的堆喷射方法研究 被引量:2

Research on Heap Spray for Integration of Multiple Technologies
下载PDF
导出
摘要 堆喷射(Heap Spray)是一种利用应用程序中可操控的脚本环境,进行大量且重复的内存申请操作,将shellcode等数据布局在需要的内存空间,从而绕过ASLR保护的攻击技术。由于堆喷射攻击具有很高的成功率,因而已经成为一种常见的漏洞利用技术。堆喷射技术是安全研究人员的研究重点,同样也是应用程序和安全软件防护的重点。因此,研究最新软件环境下的可靠且精准的堆喷射方法具有重要的实际应用价值,有利于促进堆喷射检测与保护技术的发展。在堆喷射技术实现方面,已有的方法不能够适应最新的软件环境,且准确率低、容易被检测和阻止。针对该问题,文章提出一种融合多种技术的堆喷射方法,该方法先通过编码技术对shellcode进行编码,添加一系列无效反汇编指令后,再根据IE浏览器堆管理机制构造大小合适且具有随机性的喷射块,最后对喷射代码进行混淆,得到最终的堆喷射代码。实验结果表明,该方法能够绕过多种安全防护技术在最新的IE浏览器中进行精确堆喷射,方法的准确率高,兼容性与抗查杀性强。 Heap spray is an attack technology to bypass ASLR. It uses the scripting support in program to put the shellcode at a predictable address by allocating and filling chunks of memory in the heap. The heap spray attack has a high success rate, and it is a common vulnerability exploitation technique. Heap spray technology is the focus of security researcher's study, as well as the priority of application and security software's protection. Therefore, the study on reliable and accurate heap spray technique under the latest software environment will help to improve the detection and protection technique of it. As to the realization of heap spray technique, existing technique is not adapted to the latest software environment which lacks precision and can be easily monitored as well as prevented. This paper proposes a comprehensive heap spray technique. With the new technique, we can code the shellcode and add a series of ineffective disassemble instructions, thus, to build randomized spray chunk structure with the right size based on the IE browser's heap management mechanism and obfuscate the heap spray script in order to get the final one. The results suggested that the new technique can achieve precision heap spray of the latest IE browser bypassing lots of safety prevention. Besides, the new technique is remarkably accurate and more compatible.
出处 《信息网络安全》 2016年第6期48-55,共8页 Netinfo Security
基金 国家242信息安全计划[2005C48]
关键词 堆喷射 IE浏览器 漏洞利用 heap spray IE browser vulnerability exploitation
  • 相关文献

参考文献22

  • 1CHOI Y, KIM H, LEE D. Detecting Heap-spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution[J].1EICE Transactions on Communications, 2012, 95 (5): 1711-1721.
  • 2ANIBAL S, FEDERICO M. HTML5 Heap Sprays, Pwn All The ThingsiEB/OL]. https://www.coresecurity.com/corelabs- research/publications/htmlS-heap-sprays-pwn-all-things, 2012-9-20.
  • 3PETER V E. DEPS--Precise Heap Spray on Firefox and IE10[EB/OL]. http:/ /www.corelan.be/index.php/2013/02/19 / deps-precise-heap- spray-on-firefox-and-iel0, 2013-2-19.
  • 4PETER V. A Browser is Only as Strong as Its Weakest Byte-Part 2[EB/OL]. https://blog.exodusintel.com/2013/12/09/a-browser-is- only-as-strong-as-its-weakest-byte-part-2/, 2013-12-28.
  • 5Galois. The Art of Leaks: The Return of Heap Feng Shui[EB/OL]. https://cansecwest, com/slides/2014/The%20Art%20of%20Leaks%20-%20 read%20version%20-%20Yoyo.pdf, 2014-3-14.
  • 6Exp-sky. IE 11 0day & Windows 8.1 Exploit[EB/OL]. http:// download.csdn.net/detail/u010702509/7990681, 2014-9-25.
  • 7SOTIROV A, DOWD M. Bypassing Browser Memory Protections in Windows Vista[EB/OL]. http://www.phreedom.org/research/bypassing- browser-memory-protections/bypassing- browser-memory-protections. pdf, 2016-1-22.
  • 8韦鲲鹏,葛志辉,杨波.PHP Web应用程序上传漏洞的攻防研究[J].信息网络安全,2015(10):53-60. 被引量:12
  • 9魏强,韦韬,王嘉捷.软件漏洞利用缓解及其对抗技术演化[J].清华大学学报(自然科学版),2011,51(10):1274-1280. 被引量:9
  • 10DANNYW.Windows漏洞利用技术总结[EB/OL].http://wwwcnblogs.com/Danny-Wei/p/3766337.html,2014-6-3.

二级参考文献122

共引文献92

同被引文献11

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部