期刊文献+

软件二进制代码重用技术综述 被引量:10

Survey on Software Binary Code Reuse Technologies
下载PDF
导出
摘要 在当前的计算机系统架构和软件生态环境下,ROP(return-oriented programming)等基于二进制代码重用的攻击技术被广泛用于内存漏洞利用.近年来,网络空间安全形势愈加严峻,学术界、工业界分别从攻击和防护的角度对二进制代码重用技术开展了大量研究.首先介绍了二进制代码重用技术的基础.然后分析了二进制代码重用攻击技术的演变和典型攻击向量.同时,对基于控制流完整性和随机化的防护方法进行了讨论,对工业界最新的二进制代码重用防护机制CET(control-flow enforcement technology)和CFG(control flow guard)进行了剖析.最后讨论了二进制代码重用技术今后的发展方向,包括潜在的攻击面和防御机制增强的思路. Within the current commercial system achitecture and software ecosystem, code reuse techniques, such as ROP (return- oriented programming), are widely adopted to exploit memory vulnerabilities. Driven by the serve situation of cyberspace security, academical and industrial communities have carried out a great amount of research on binary code reuse from both defensive and offsensive perspevtives. This paper discusses the essence and basics of binary code reuse, along with an analysis of its technique roadmap and typical attack vectors. Corresponding defences and mitigations based on control flow integrity and memory randomization are analyzed as well. Dissections on CET (control flow enforcement technology) and CFG (control flow guard), two latest industrial techniques for binary code reuse mitigation, are presented. The future of binary code reuse, including protential attack vectors and possible mitigation strategies, is also discussed at the end of this paper.
出处 《软件学报》 EI CSCD 北大核心 2017年第8期2026-2045,共20页 Journal of Software
基金 NSFC-通用技术基础研究联合基金(U1636107) 国家自然科学基金(61332019 61202387 61373168) 国家重点基础研究发展计划(973)(2014CB340600)~~
关键词 信息安全 信息系统安全 软件安全 二进制代码重用 内存漏洞利用 information security information system security software security binary code reuse vulnerability exploitation
  • 相关文献

参考文献1

二级参考文献7

  • 1陈悦,薛质,王轶骏.针对Shellcode变形规避的NIDS检测技术[J].信息安全与通信保密,2007,29(1):99-103. 被引量:3
  • 2SHACHAM H. The Geometry of Innocent Flesh on the Bone Return-into-libc Without Function Calls(on the x86)[EB/ OL]. (2007-11-20)[2012-4-3]. http: //dl.acm.org/citation. cfm?id=1315313.
  • 3CHECKOWAY S, DAVI L, DMITRIENKO A, et al. Return-oriented Programming Without Returns[C]// Proceedings of the 17^th ACM Conference on Computer and Communications Security. NY: New York, 2010.
  • 4KORNAU T. Return Oriented Programming for the ARM Architecture. Masterthesis[D]. Germany: Ruhr-University Bochum, 2009.
  • 5刘仙艳.移动终端开放平台--Android[J].通信技术,2011,44(4):50-53.
  • 6HUANG ZhiJun, ZHENG Tao, LIU Jia. A Dynamic Detective Method against ROP Attack on ARM Platform[C]//SEES 2012. Zurich, Switzerland: IEEE Publications, 2012:51-57.
  • 7丛欣.ARM处理器在网络安全领域中的应用[J].信息安全与通信保密,2011,9(5):41-42. 被引量:3

共引文献2

同被引文献58

引证文献10

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部