期刊文献+

Windows堆地址随机化原理剖析与改进 被引量:1

Analysis and Improvement of Windows Heap Randomization
下载PDF
导出
摘要 Windows作为公众使用最广泛的一类操作系统,其自身的安全性成为国内外攻击者和研究者关注的焦点。文章从Windows内存管理体系入手,使用逆向工程和动态调试的手段对Windows操作系统堆地址随机化机制进行分析,设计并实现了一种随机化改进方案。研究工作主要分为两方面:一方面是通过逆向调试,深入探索Windows堆内存区域,重点探查堆地址随机化机制的实现原理和方法,并结合已知的几种攻击手法对Windows堆地址随机化机制的脆弱性进行分析和验证;另一方面是根据分析结果设计相应的解决方案,进一步增强堆区地址排布的随机性,有针对性地降低已知攻击手法的危害。文章提出的方案可以有效弥补Windows系统在堆地址随机化方面设计的不足,降低相关攻击技术的危害,提升系统整体安全性能。 As the most widely used operating system,the security of Windows has become the focus of attackers and researchers at home and abroad. This paper starts with Windows memory management system,analyzes the heap address randomization mechanism of Windows operating system by reverse engineering and dynamic debugging, and designs and implements a randomized improvement scheme. The research work is divided into two parts: One is through the reverse debugging,exploring the Windows heap memory area,exploring the realization principle and method of heap address randomization mechanism,and analyzing and verifying the vulnerabilities of Windows heap address randomization mechanism by combined with several known attack methods. On the other hand,the corresponding solution is designed according to the analysis results to further enhance the randomness of the heap address configuration, and to reduce the harms of the known attack methods. The proposed scheme can effectively compensate for the lack of Windows system in heap address randomization design,reduce the harms of related attack technology,and improve the overall security performance of the system.
出处 《信息网络安全》 CSCD 2017年第7期1-10,共10页 Netinfo Security
基金 国家自然科学基金[61170282]
关键词 WINDOWS 随机化 逆向工程 Windows heap randomization reverse engineering
  • 相关文献

参考文献4

二级参考文献20

  • 1David A Solomon,Mark E Russinovlch.lnside Microsoft Windows2000[M].Microsoft Press, 2000.
  • 2Tomasz Nowak,Antek Sawicki.The Undocumented Functions of Microsoft Windows NT/2000 [EB/OL].http://undocumented.ntintemals.net.
  • 3Microsoft MSDN Library(April 2000 edition).Microsoft Corporation,http://msdn.microsoft.com,2000.
  • 4Microsoft corporation. Windows 8 security improvements[EB/OL].https://techriet.microsoft.com/en-us/windows/jj983723.aspx, 2015.
  • 5Microsoft corporation. What's Changed in Security Technologies inWindows 8.1 [EB/OL].https://technet.microsoft.com/library/dn344918.aspx, 2013.
  • 6UEFI Forum. Unified Extensible Firmware Interface SpecificationVersion 2.4[EB/OL].http://www.uefi.org/sites/default/files/resources/UEFI_2.4.pdf, 2013.
  • 7Microsoft corporation. Early Launch Anti-Malware[EB/OL].https://msdn.microsoft.com/ en -us/library/windows/hardware/dn265157(v=vs.85).aspx, 2015.
  • 8Trusted Computing Group. Trusted Platform Module (TPM)Specifications [EB/ OLj .https://www.trustedcomputinggroup.org/developers/, 2015.
  • 9Ben Hawkes. Attacking the Vista Heap[EB/OLJ.http://www.lateralsecurity.com/downloads/hawkes_ruxcon-nov-2008.pdf, 2008.
  • 10Microsoft corporation. Data Execution Prevention[EB/OL].https://msdn.microsoft.com/en-us/library/windows/desktop/aa366553(v=vs.85).aspx, 2015.

共引文献24

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部