期刊文献+

动态共享库保护方法研究 被引量:3

Study on Protection Method for Dynamic Shared Library
在线阅读 下载PDF
导出
摘要 引入动态共享库机制能节约内存资源,并容易升级,但却带来安全隐患。针对该问题,研究动态链接机制,提出一种针对动态共享库的程序运行时监控和保护的方法。对共享库文件进行签名和验证,并对库函数调用实行监控。实验结果显示,该方法对于动态共享库的几种常见攻击方法有较好的防御作用。 Dynamic link mechanism for shared libraries brings some advantages, such as physical memory saving, facilitating the upgrade of libraries, etc. But it also leads to new security risks. Aiming at this problem, this paper studies the dynamic link mechanism in an attempt to bring up a run-time monitoring and protection method for dynamic shared libraries, which give each shared library file a digital signature and verify it in runtime, and monitor every library function call. Experimental results show that the method is effective for defending several common attacks to shared libraries.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第4期118-120,124,共4页 Computer Engineering
基金 国家“863”计划基金资助项目“分布式可信计算系统研究”(2007AA01Z409) 江苏省科技支撑计划基金资助项目“可信操作系统新技术研发”(BE2008124)
关键词 动态共享库 数字签名 程序监控 dynamic shared library digital signature program monitoring
  • 相关文献

参考文献10

  • 1Gates A Q, Mondragon O. FasTLInC: A Constraint-based Tracing Approach[J]. Journal of Systems and Software, 2001, 63(3): 241-258.
  • 2Clowes S. Injectso: Modifying and Spying on Running Processes Under Linux and Solaris[Z]. [2008-12-10]. http://www.blackhat. com/presentations/bh-europe-01/shaun-clowes/hh-europe-01 - clowes.ppt.
  • 3Richter J. Load Your 32-bit dll into Another Process's Address Space Using Injlib[J]. Microsoft Systems Journal, 1996, 9(3): 13-16.
  • 4Cesare S. Shared Library Redirection via ELF PLT Infection[J]. Phrack Magazine, 2000, 10(56).
  • 5Shacham H. The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls(on the x86)[C]//Proc, of the 14th ACM Conference on Computer and Communications Security.Alexandria, VA, USA: [s. n.], 2007.
  • 6Baratloo A, Singh N, Tsai T. Libsafe: Protecting Critical Elements of Stacks[Z]. (1999-12-13). http://www.research.avayalabs.congprojeet/ libsafe.
  • 7Alert7. Solar Designer's Non-executable stack的实现机理分析[EB/OL]. (2001-12-03). http://www.xfocus.net/articles/200104/160.html.
  • 8Linn C M, Rajagopalan M, Baker S, et al. Protecting Against Unexpected System Calls[C]//Proc. of the 14th Usenix Security Symposium. Baltimole, MD, USA: [s. n.], 2005.
  • 9ELF Shell Crew. Embedded ELF Debugging: The Middle Head of Cerberus[J].Phrack Magazine, 2005, 9(63).
  • 10Anonymous Author. Runtime Process Infection[J]. Phrack Magazine, 2002, 8(59).

同被引文献21

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部