二进制代码级函数指针攻击机理与检测研究  

Research on Pointer Attack Mechanism and Detection of Binary Code Level Function

在线阅读下载全文

作  者:李昆仑[1] 巩春景 李尚然 王琳[1] 张德智 LI Kun-lun;GONG Chun-jing;LI Shang-ran;WANG Lin;ZHANG De-zhi(College of Electronic and Information Engineering,Hebei University,Baoding 071000,China)

机构地区:[1]河北大学电子信息工程学院,河北保定071000

出  处:《小型微型计算机系统》2018年第12期2657-2661,共5页Journal of Chinese Computer Systems

基  金:国家自然科学基金项目(61672205)资助

摘  要:尽管有许多防御和保护机制已经被引入到现代操作系统中,但内存泄漏漏洞仍然对软件系统和网络安全造成巨大威胁.对于返回导向式编程ROP攻击(Return Oriented Programming)通常利用缓冲区溢出漏洞改写函数的返回地址,而函数指针在c/c++中普遍存在,比如struct结构体和虚函数中都含有大量的函数指针.本文通过实验表明了覆盖函数指针发起的ROP攻击是存在的并且提出fpDetect检测方法用来检测这种攻击.采取二进制代码插桩技术与动态检测相结合,大大提高了检测的准确性.通过实验证明了fpDetect检测方法可以应用在Linux和windows操作系统中.Although many defense and protection mechanisms have been introduced into modern operating systems,memory leaks still create a huge threat to software systems and network security. The ROP attack usually uses the buffer overflow vulnerability to rewrite the return address of the function,and the function pointers are ubiquitous in c/c + +. for example,the struct and the virtual function contain a large number of function pointers. In this paper,we have been proved that the ROP attack initiated by the coverage function pointer exists,and proposed a fpDetect detection method to detect such attacks. The combination of binary code piling technology and dynamic detection greatly improves the accuracy of detection. Experiments prove that the fpDetect detection method can be applied in Linux and windows operating systems.

关 键 词:ROP 缓冲区溢出 函数指针 二进制代码插桩 动态检测 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象