Windows平臺(tái)下ROP攻擊緩解技術(shù)研究
[Abstract]:Internet is the most dynamic and innovative industry in the 21 century. It is deeply rooted in every corner of human society. People enjoy the convenient life brought by the Internet, but ignore the accompanying security problems. In recent years, network security incidents emerge in endlessly, such as the Google Northern Lights APT event, Hacking Team information leak event and Baidu application Wormhole vulnerability incident have caused great damage, from which we can see that the current Internet security situation is very serious. In security incidents, ROP attacks have attracted increasing attention from hackers and security researchers because they can bypass most of the current defense measures. In this paper, aiming at the serious situation of ROP attack in current vulnerability attack and defense, a new method of ROP attack mitigation is proposed based on the study of normal program jump, and the corresponding prototype system is designed and implemented. The main work of this paper is as follows: first, on the basis of debugger principle, this paper puts forward the analysis method of hot spot dynamic link library through the unique page daemon exception of Windows system. According to this method, the HMAT instruction analysis tool is implemented. The HMAT instruction analysis tool can analyze the execution characteristics of the program at the command level during the run time, and analyze some dynamic link libraries in the process separately according to the user's needs. On the basis of analyzing several software in Windows system, three kinds of indirect jump instructions of call,jmp and ret are studied in detail by using HMAT instruction analysis tool. It is found that the three kinds of indirect jump instructions are different from those under ROP attack during normal execution. By identifying the completeness of the three kinds of indirect jump during execution, we can find out whether the current program is attacked by ROP. Secondly, three problems that need to be faced in the process of detecting and defending ROP attacks are studied. They are when to detect in the process of program running, which points to detect and how to identify ROP attacks. On the basis of the traditional detection method, it is determined whether the current program is attacked or not when the key function is called, and the criteria of function selection are determined. Finally, the innovative proposal is put forward. The single-step debugging technique is used to identify each instruction executed and the completeness of indirect jump in the sequence of instructions is used to determine whether the instruction is currently under ROP attack. Thirdly, the ROP attack mitigation scheme is proposed based on the research results of three problems, and the prototype system is implemented according to the design scheme. In this paper, the realization goal of the mitigation system and the design of each module are described in detail. Finally, through three vulnerability samples, the prototype system of ROP attack mitigation is tested in detail. The test results show that the system can effectively defend against ROP attack.
【學(xué)位授予單位】:電子科技大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2016
【分類號(hào)】:TP393.08
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 林麗華;;讓W(xué)indows Media Player的跳轉(zhuǎn)列表不再貪污[J];電腦迷;2010年09期
2 梁阿磊;吳浩;李小勇;;動(dòng)態(tài)二進(jìn)制翻譯中的跳轉(zhuǎn)優(yōu)化技術(shù)[J];四川大學(xué)學(xué)報(bào)(自然科學(xué)版);2007年06期
3 朱俊華;;一種高速的條件跳轉(zhuǎn)指令硬件實(shí)現(xiàn)[J];計(jì)算機(jī)技術(shù)與發(fā)展;2008年07期
4 白鋒,程旭;一種針對(duì)短循環(huán)的跳轉(zhuǎn)隱藏技術(shù)[J];計(jì)算機(jī)工程與應(yīng)用;2003年22期
5 羅文華;;基于Windows7環(huán)境下的跳轉(zhuǎn)列表解析用戶操作行為[J];警察技術(shù);2014年03期
6 飄零雪;;Windows 7跳轉(zhuǎn)列表延伸到所有程序[J];電腦迷;2010年13期
7 大江東去;;利用CCleaner快速清理跳轉(zhuǎn)列表[J];電腦迷;2012年02期
8 齊寧;趙榮彩;;IA-64代碼翻譯中的跳轉(zhuǎn)表恢復(fù)技術(shù)[J];計(jì)算機(jī)工程;2006年23期
9 蘇銘,宋宗宇,趙榮彩,齊寧;IA-64二進(jìn)制翻譯中跳轉(zhuǎn)表恢復(fù)技術(shù)[J];微計(jì)算機(jī)信息;2005年17期
10 劉曼;;使用跳轉(zhuǎn)指令時(shí)應(yīng)注意的問(wèn)題[J];江西科學(xué);2007年04期
相關(guān)重要報(bào)紙文章 前5條
1 彭茂山 黃貴清 林直友;Unix下子目錄的模糊跳轉(zhuǎn)[N];計(jì)算機(jī)世界;2001年
2 秤桿;輕松搞定 Windows 7的跳轉(zhuǎn)列表[N];中國(guó)電腦教育報(bào);2009年
3 北京 YATE;PowerPoint使用技巧[N];中國(guó)電腦教育報(bào);2001年
4 本報(bào)評(píng)論員 付小為;歸家之路濃縮國(guó)家社會(huì)變遷[N];長(zhǎng)江日?qǐng)?bào);2014年
5 廣西 可愛(ài)的木阿;給Flash作品加把鎖[N];電腦報(bào);2003年
相關(guān)碩士學(xué)位論文 前3條
1 許云清;Windows平臺(tái)下ROP攻擊緩解技術(shù)研究[D];電子科技大學(xué);2016年
2 孫廷韜;動(dòng)態(tài)二進(jìn)制翻譯中跳轉(zhuǎn)分析與優(yōu)化[D];上海交通大學(xué);2010年
3 朱艷坤;雙穩(wěn)態(tài)層合板跳轉(zhuǎn)過(guò)程分析與新型柔性蜂窩結(jié)構(gòu)性能評(píng)價(jià)[D];大連理工大學(xué);2014年
,本文編號(hào):2366804
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2366804.html