期刊文献+

代码重用攻击与防御机制综述 被引量:10

A Survey of Code Reuse Attack and Defense Mechanisms
下载PDF
导出
摘要 由于C与C++等计算机程序中广泛存在的漏洞,攻击者可以通过这些漏洞读取或篡改内存中的数据,改变计算机程序原有的执行状态达到破坏的目的。为此研究者进行了不懈地努力并采取了一些卓有成效的保护机制,例如数据不可执行与内存布局随机化,这些防御机制对于早期的代码注入攻击起到了极好的防御效果,然而计算机系统的安全性依然不容乐观。攻击者在无法通过向内存中注入自己的代码并执行的方式完成攻击后,开始利用内存中原有的代码,通过控制它们执行的顺序来达到自己的目的,这种攻击方式称为代码重用攻击,它具有极大的威胁性,能够绕过多种现行的安全措施,并成为攻击者的主流攻击方式。为此,研究界针对代码重用攻击的研究也逐渐增多。本文简述了代码重用攻击的起源,攻击实现的方式,系统化地总结了现有的防御机制并对这些防御机制进行了评价。对代码重用攻击的根本原因进行了简要的分析,并提出了一种新的防御机制设计思路。 Due to the wide existence of vulnerabilities in computer programs such as C and C++, computer systems is vulnerable to be tampered by adversary changing the original running states. Researchers have made great efforts and take some effective protection mechanisms, for instance, Data Execution Prevention and Address Space Layout Randomization. These security mechanisms have a great effect against the primitive attack patterns like code-injection attack. However, the security of computer system is still not optimistic. Though the adversary could not inject their own codes into the memory then run them ever again, they began to use the original benign codes in the memory, manipulate them to achieve malicious purpose by changing their order of operating, which is called code-reuse attack. And it is able to bypass a variety of security mechanisms of commodity computer systems, thus it has become a major threat and the main pattern of hacking. For this reason, researches about code-reuse attack have been taken up in recent years. This paper illustrates the origin of code-reuse attack and achieved way of attack, summarizes the existing defense mechanisms and simply evaluates these defense mechanisms systematically. Meanwhile, this paper analyzes briefly the basic reason of code reuse attack and puts forward an new idea of defense mechanism designing.
出处 《信息安全学报》 2016年第2期15-27,共13页 Journal of Cyber Security
关键词 计算机系统安全 内存攻击 代码重用攻击 computer system security memory security code-reuse attack
  • 相关文献

参考文献2

二级参考文献41

  • 1冯萍慧,连一峰,戴英侠,李闻,张颖君.面向网络系统的脆弱性利用成本估算模型[J].计算机学报,2006,29(8):1375-1382. 被引量:28
  • 2林志强,王逸,茅兵,谢立.SafeBird:一种动态和透明的运行时缓冲区溢出防御工具集[J].电子学报,2007,35(5):882-889. 被引量:6
  • 3ZHANG C, TAO W, CHEN Z, et aL Practical control flow integrity & randomization for binary executables [ C ]// Proceedings of the 2013 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2015:559 - 573.
  • 4RODES B D, NGUYEN-TUONG A, HISER J D, et al. Defense a- gainst stack-based attacks using speculative stack layout transforma- tion [ C]//RV 2012: Proceedings of the Third International Confer- ence on Runtime Verification, LNCS 7687. Berlin: Springer-Vet- lag, 2013:308-313.
  • 5COWAN C, PU C, MAIER D, et al. StackGuard: automatic adap- tive detection and prevention of buffer-overflow attacks [ C ]// SSYM'98: Proceedings of the 7th Conference on USENIX Security Symposium. Berkeley: USENIX Association, 1998, 7:63-78.
  • 6BHATKAR S, DUVARNEY D, SEKAR R. Address obfuscation: an efficient approach to combat a broad range of memory error exploits [ C]// Proceedings of the 12th USENIX Security Symposium. Berke- ley: USENIX Association, 2003:105 - 120.
  • 7RATANWORABHAN P, LIVSHITS B, ZORN, B. NOZZLE: a de- fense against heap-spraying code injection attacks [ C]//SSYM '09: Proceedings of the 18th USENIX Security Symposium. Berkeley: USENIX Association, 2009:169 - 186.
  • 8SHACHAM H, PAGE M, PFAFF B, et al. On the effectiveness ofaddress-space randomization [ C]// CCS '04: Proceedings of the 11 th ACM Conference on Computer and Communications Security. New York: ACM, 2004:298-307.
  • 9SHACHAM H. The geometry of innocent flesh on the bone: return- into-libc without function calls (on the x86) [ C]// CCS '07: Pro- ceedings of the 14th ACM conference on Computer and Communica- tions Security. New York: ACM, 2007:552 -561.
  • 10COWAN C, BEATTIE S, JOHNSEN J, et aL PointGuard: protec- ting pointers from buffer overflow vulnerabilities [ C]// SSYM '03: Proceedings of the 12th Conference on USENIX Security Symposi- um. Berkeley: USENIX Association, 2003: 91-104.

共引文献2

同被引文献41

引证文献10

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部