期刊文献+

RTF数组溢出漏洞挖掘技术研究 被引量:4

Research on RTF array overflow vulnerability detection
下载PDF
导出
摘要 在虚函数执行中,由于错误操作C++对象的虚函数表而引起数组溢出漏洞。通过攻击虚函数造成系统崩溃,甚至导致攻击者可直接控制程序执行,严重威胁用户安全。为尽早发现并修复此类安全漏洞,对该安全漏洞的挖掘技术进行深入研究,结合MS Word解析RTF文件和虚函数调用之间的联系,发现MS Word在解析异常的RTF文件时存在数组溢出漏洞,并进一步提出基于文件结构解析的Fuzzing测试方法来挖掘RTF数组溢出漏洞。在此基础上,设计了RTF数组溢出漏洞挖掘工具(RAVD,RTF array vulnerability detector)。通过RAVD对RTF文件进行测试,能够正确挖掘出数组溢出漏洞。实际的模糊测试表明,设计的工具相比传统的漏洞挖掘工具具有更高的挖掘效率。 When the virtual function was executed, it could cause array overflow vulnerability due to error operation of the virtual function table of C++ object. By attacking the virtual function, it could cause the system crash, or even the at- tacker to control the execution of program directly was allowed, which threatened user's security seriously. In order to find and fix this potential security vulnerability as soon as possible, the technology for detecting such security vulnerabil- ity was studied. Based on the analysis of the virtual function call during the MS Word parsing RTF files, the array over- flow vulnerability generated by MS Word parsing abnormal RTF files, and a new RTF array overflow vulnerability detec- tion method based on the file structure analytical Fuzzing was proposed. Besides, an RTF array overflow vulnerability detection tool (RAVD, RTF array vulnerability detector) was designed. The test results show RAVD can detect RTF array overflow vulnerabilities correctly. Moreover, the Fuzzing results show RAVD has higher efficiency in comparison with traditional file Fuzzing tools.
出处 《通信学报》 EI CSCD 北大核心 2017年第5期96-107,共12页 Journal on Communications
基金 国家自然科学基金资助项目(No.61202440 No.61402057) 江苏省产学研前瞻性联合研究基金资助项目(No.BY2016050-01) 江苏省科技计划基金资助项目(No.BK20160411)~~
关键词 RTF文件 漏洞挖掘 FUZZING测试 数组溢出 RTF document, vulnerability detection, Fuzzing test, array overflow
  • 相关文献

参考文献4

二级参考文献126

  • 1陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(z1):1933-1938. 被引量:115
  • 2赵云山,宫云战.基于符号分析的静态缺陷检测技术研究[博士学位论文].北京:北京邮电大学,2012.
  • 3Joanne K, Colin P H. Flash vulnerabilities analysis of US educational websites [J]. International Journal of Electronic Security and Digital Forensics, 2010, 3(2): 95-107.
  • 4Amit Y. Cross-site scripting through Flash in gmail based services [EB/OL]. (2012-03-22) [2013-12-10]. http://blog. watchfire, com/wfblog/2010/03/cross-site-scripting-through- flash-in-gmail- based-services, html.
  • 5Ruiz-Martinez A. A survey on solutions and main free tools for privacy enhancing Web communications [J]. Journal of Network and Computer Applications, 2012, 35 (5) : 1473- 1492.
  • 6OWASP. Top ten project [EB/OL]. (2013-12-03) [2013-12- 10]. https://www, owasp, org/index, php/Category: OWASP_ Top_Ten_Project.
  • 7Engin K, Christopher K, Giovanni V, et al. Noxes: A client-side solution for mitigating cross-site scripting attacks [C] //Proc of the 2006 ACM Symp on Applied Computing. New York: ACM, 2006:330-337.
  • 8Ter L M, Venkatakrishnan V N. Blueprint, Robust prevention of cross-site scripting attacks for existing browsers [C] //Proc of the 30th IEEE Syrup on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 2009: 331-346.
  • 9Yacin N, Prateek S, Dawn S. Document structure integrity: A robust basis for cross-site scripting defense [EB/OL]. 2009[2013-12-10]. http://webblaze, cs. berkeley, edu/dsi. html.
  • 10Adam B, Adrienne P F, Prateek S, et al. Protecting browsers from extension vulnerabilities, EECS-2009-185 [R]. Berkeley: University of California, Berkeley, 2009.

共引文献83

同被引文献58

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部