期刊文献+

漏洞利用工具研发框架研究 被引量:3

Research on Vulnerability Utilization Tool Development Framework
下载PDF
导出
摘要 目前已有的漏洞利用平台支持的二进制漏洞种类不多,并且这些平台的灵活性和开发效率较低,缺少专门针对二进制漏洞利用工具的研发和生成系统。为此,提出一种新的二进制漏洞利用工具自动化生成框架。把漏洞利用过程模块化,通过多种模块组合的方式快速灵活地进行漏洞利用工具的研发和自动化生成。针对每个模块的不同特点,采用不同的设计方案,以实现更短的开发周期和更高的开发效率。实验结果表明,该框架简单易用,具有较高的灵活性和扩展性。 At present, the number of binary vulnerabilities supported by existing vulnerability utilization platforms is not much,and the flexibility and development efficiency of these platforms is low. There are few utilization tool R & D and generation systems specifically for binary vulnerabilities. Therefore, this paper presents a new automatic generation framework for binary vulnerability exploit tool. The framework modularizes the exploit process. The development and automation of vulnerability utilization tools are quickly and flexibly generated through a variety of modular combinations. According to the different characteristics of each module,different design is used to achieve a shorter development cycle and higher development efficiency. Experimental results show that the framework is simple and easy to use, with high flexibility and extensibility.
出处 《计算机工程》 CAS CSCD 北大核心 2018年第3期127-131,共5页 Computer Engineering
关键词 漏洞利用 二进制漏洞 模块化 shellcode模块 研发框架 vulnerability utilization binary vulnerability modularization shellcode module development framework
  • 相关文献

参考文献3

二级参考文献22

  • 1gyzy.菜鸟版Expliot编写指南之三十五:编写Unicode有效的ShellCode[J].黑客防线,2007(5):70-72. 被引量:1
  • 2王清.0day安全:软件漏洞分析技术[M].北京:电子工业出版社,2008.
  • 3Xfocus Team.Shellcode编写技术[EB/OL].(2003-08-31).http://www.x focus.net/articles/200308/604.html.
  • 4匿名.编写变形的shellcode[EB/OL].(2008-08-05).http://www.hacker.com.cn/article/view_14408.html.
  • 5王炜.Q版缓冲区溢出教程[EB/OL].(2008-02-26).http://bbs.pediy.com/showthread.php?t=60252&tcatid=42.
  • 6Whitehouse O.An Analysis of Address Space Layout Ran2 Domization on Windows Vista[M].[S.l.] :Symantec,2007.
  • 7Whitehouse O.Analysis of GS Protections in Windows Vista[M].[S.l.] :Symantec,2007.
  • 8Berend Jan Wever. Alphanumeric GetPC Code a, nd She,code Encoder Decoder. http://www.securiteam.com/exploits/ 5JPOM2KBPE.html, 29 Jan. 2004.
  • 9王清,张东辉.Oday安全:软件漏洞分析技术(第二版).北京:电子工业出版社,2011.
  • 10Balakrishnan G,Reps T.Wysinwyx:What you see is not what you execute[J].ACM Transactions on Programming Languages and Systems(TOPLAS),2010,32(6):23.

共引文献8

同被引文献26

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部