期刊文献+

Windows Shellcode自动构建方法研究 被引量:2

Research on Automatic Building Approach of Windows Shellcode
下载PDF
导出
摘要 随着计算机技术的飞速发展,软件的规模及复杂程度在快速增加的同时也带来了极大的安全隐患,各种软件漏洞层出不穷,漏洞利用成为研究的热点。在漏洞利用的过程中,shellcode作为最关键的组件,其质量直接影响到漏洞利用的效果。针对已有的shellcode自动构建方法存在兼容性低、对大型shellcode支持性较差、自动化程度及易用性较低的缺点,文章提出一种Windows shellcode自动构建方法。该方法通过编写框架提供编程接口和编程环境,使编写者通过C语言编写shellcode,并将shellcode的编译、生成、提取、测试以及编码和优化过程进行整合,实现x86/x64平台Windows shellcode的自动构建。文章对基于该方法实现的原型系统进行了验证,结果表明,系统在兼容性、可靠性、自动化性能方面均有较好表现,能够利用系统顺利完成shellcode的构建任务,具有较高的实际应用价值。 With the rapid development o f computer technology, the scale and com plexity o f software is increasing, which also brought great security riskat the same time, shellcode is the key component in the process of the vulne rability exploitation. Its qua lity directly affects the effect of the exploit. But existing techniques have many downsides, such as less automation, usability and compatibility problems. In this paper, an automatic building approach of Windows shellcode has been proposed, which can provide programming interface & environment, and can let the programmers write shellcode with C language. In order to b uild the Windows shellcode of x86/x64 platform automatically, it also includes the compilation, building, extracting, testing, encoding and optimization steps. Based on the approach, this paper implements the prototype system of shellcode building automatically and makes some experiments. The result shows that the system performs well in compatibility, reliability and automatic performance. The system can be applied to shellcode building easily.
出处 《信息网络安全》 CSCD 2017年第4期15-25,共11页 Netinfo Security
基金 国家242信息安全计划[2005C48]
关键词 漏洞利用 SHELLCODE 自动构建 vulnerability exploitation shellcode automatic building
  • 相关文献

参考文献3

二级参考文献23

  • 1腾讯移动安全实验室.2015年上半年手机安全报告[EB/OL].http://scan.qq.com/security_lab/news_detail_321.html, 2016一02一 18.
  • 2DAIShuaifu, WEI Tao, ZOU Wei. DroidLogger: Reveal SuspiciousBehavior of Android Applications via Instrumentation[C]//IEEE. 7thInternational Conference on Computing and Convergence Technology.
  • 3BATYUKL, HERPICH M, CAMTEPE S A, et al. Using StaticAnalysis for Automatic Assessment and Mitigation of Unwanted andMalicious Activities within Android Applications[C]//ACM. 6thInternational Conference on Malicious and Unwanted Software, October18-19, 2011, Fajardo. New York: ACM, 2011: 66-72.
  • 4XURubin, SAIDI H, ANDERSON R. Aurasium: Practical PolicyEnforcement for Android Applications[C]//USENIX. 21st USENIXConference on Security Symposium, August 8-10,2012,Bellevue. NewYork: ACM, 2012: 27.
  • 5ISOHARAT, TAKEMORI K,KUBOTA A. Kernel-based BehaviorAnalysis for Android Malware Detection[C]//Guangdong University ofTechnology, Beijing Normal University, Hainan Province Institution ofComputing. 7th International Conference on Computational Intelligenceand Security, December 3-4,2011,Hainan. New Jersey: IEEE, 2011:1011-1015.
  • 6ZHOUYajin, JIANG Xuxian. Dissecting Android Malware:Characterization and Evolution[C]//IEEE. 2012 IEEE Symposium onSecurity and Privacy, May 20-23,2012, San Francisco. New Jersey: IEEE,2012: 95-109.
  • 7Google.官方Android 开发文档[EB/OL]. http://developer.android.com/tools/help/monkey.html, 2016-2-18.
  • 8DAVISB,SANDERS B, KHODAVERDIAN A, et al. I-ARM-Droid: A Rewriting Framework for In-App Reference Monitors forAndroid Applications [EB/OL]. http://web.cs.ucdavis.edu/~hchen/paper/most2012iarmdroid.pdf, 2016-1-22.
  • 9PENG Guojun,SHAO Yuru,WANG Taige,ZHAN Xian,ZHANG Huanguo.Research on Android Malware Detection and Interception Based on Behavior Monitoring[J].Wuhan University Journal of Natural Sciences,2012,17(5):421-427. 被引量:5
  • 10李程,魏强,彭建山,王清贤.基于分解重构的网络软件测试数据生成方法[J].计算机科学,2013,40(10):108-113. 被引量:3

共引文献13

同被引文献2

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部