期刊文献+

针对内核非控制数据攻击的在线检测方法研究 被引量:2

A RUNTIME DETECTION METHOD FOR KERNEL NON-CONTROL-DATA ATTACKS
下载PDF
导出
摘要 操作系统安全是计算机系统安全的基础保障和前提条件,而操作系统安全则主要依赖于系统内核的安全。针对内核的非控制数据攻击是指通过篡改内核中的某些关键数据结构,诱发内核出现漏洞和产生一系列稳定性问题,从而严重影响操作系统乃至整个计算机系统的安全。提出一种基于Kprobes内核调试机制和监视器内核线程的在线检测方法,前者用于监控内核关键函数的执行和检查相关动态性数据结构的一致性,后者通过设立专门的内核线程实现静态性内核数据结构的持续监测和不变性验证。然后在Linux平台上运用C语言设计实现了相应的内核非控制数据攻击在线检测器KNCDefender,进行了一系列验证实验和性能测试实验。实验结果表明,该方法是完全轻量级的,并能够及时检测出针对内核的各种非控制数据攻击。 Operating system security is the foundation and prerequisite of computer system security,and it is mainly depend on the security of the system kernel. By tampering some key data structures inside kernel space,kernel noncontrol-data attacks induce some kernel vulnerabilities and a series of stability problems,which will severely affect the security of operating system and even that of the whole computer system. Thus,a runtime detection method based on the Kprobes debugging mechanism and a monitor kernel thread is proposed. The former is used to monitor the execution of key kernel functions and to check the consistency of related dynamic data structures,while the latter is used to check the invariance of some static kernel data structures. Then the corresponding prototype named by KNCDefender is designed and implemental in C language on Linux platform and a series of experiments for verification and performance testing have been carried out. Experimental results show that the method proposed in this paper is completely lightweight,and various attacks against kernel non-control-data can be detected timely.
作者 黄杰 翟高寿
出处 《计算机应用与软件》 2017年第2期325-333,共9页 Computer Applications and Software
基金 中央高校基本科研业务费专项基金项目(2009JBM019) 国家留学基金项目(201307095025)
关键词 操作系统安全 内核安全 内核非控制数据攻击 Kprobes调试机制 Operating system security Security of kernel Kernel non-control-data attacks Kprobes debugging mechanism
  • 相关文献

参考文献1

二级参考文献10

  • 1Riley R,Jiang X,Xu D.Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. Recent Advances in Intrusion Detection . 2008
  • 2CVE.CVE-2010-3849. http://cve.mitre.org/cgi-bin/cvename.cginame=CVE-2010-3849 . 2010
  • 3CVE.CVE-2010-4258. http://cve.mitre.org/cgi-bin/cvename.cginame=CVE-2010-4258 . 2010
  • 4D.Rosenberg.Econet privilege escalation exploit. http://thread.gmane.comp.security.full-disclosure/76457 . 2010
  • 5CVE.CVE-2010-3904. http://cve.mitre.org/cgi-bin/cvename.cginame=CVE-2010-3904 . 2010
  • 6Xen Bench Result. http://www.bullopensource.org/xen/benchs.html . 2006
  • 7GEORGE,V,PIAZZA,T,JIANG,H.Technology Insight:Intelc Next Generation Microarchitecture Codename Ivy Bridge. www.intel.com/idf/library/pdf/sf_2011/SF11_SPCS005_101F.pdf . 2011
  • 8Hund R,Holz T,Freiling F C.Return-Oriented Rootkits:Bypassing Kernel Code Integrity Protection Mechanisms. USENIX Security Symposium . 2009
  • 9PAX.Homepage of The Pa X Team. http://pax.grsecurity.net . 2012
  • 10Seshadri A,Luk M,Qu N, et al.Sec Visor:A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes. Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP 2007) . 2007

共引文献1

同被引文献10

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部