期刊文献+

ROP攻击原理与检测方法研究 被引量:1

Research on the Principle and Detection Method of Return-Oriented Programming Attack
在线阅读 下载PDF
导出
摘要 本文介绍了一种经典的利用缓冲区溢出漏洞的攻击方法—ROP(Return-Oriented Programming)。详细描述了ROP攻击方法的思想和原理,并和以前的漏洞攻击方法进行比较,给出了他们之间的区别和联系。罗列了目前发现的一些可以结合ROP进行攻击的漏洞,并作了简单描述。相对应的,根据ROP攻击的特征,有针对性地给出静态的和动态的检测方法。最后通过实验方式展现了ROP攻击过程。 In this paper, the ROP(Return-Oriented Programming) is introduced, which is a classical method exploiting the buffer overflow vulnerabilities. The idea and principle of the ROP attack method are described in detail. After comparisons, the distinctions and connections between the ROP method and previous vulnerability attack methods are given. Some heretofore discovered vulnerabilities with the possibility of being attacked with the ROP are listed and briefly descripted. Correspondingly, targeted static and dynamic detection methods are given according to the characteristics of the ROP attack. Finally, an ROP attack process is implemented experimentally.
作者 乔延松 杜皓睿 赵绪营 QIAO Yansong;DU Haorui;ZHAO Xuying(Beijing Electronic Science and Technology Institute,Beijing 100070,P.R.China)
出处 《北京电子科技学院学报》 2021年第4期51-56,共6页 Journal of Beijing Electronic Science And Technology Institute
关键词 缓冲区溢出 ROP攻击 检测 漏洞 buffer overflow return-oriented programming attack detection vulnerability
  • 相关文献

参考文献7

二级参考文献61

  • 1林志强,王逸,茅兵,谢立.SafeBird:一种动态和透明的运行时缓冲区溢出防御工具集[J].电子学报,2007,35(5):882-889. 被引量:6
  • 2BryantRE,0’HallaronDR,龚奕利,雷迎春译.深入理解计算机系统(第2版)[M].北京:机械工业出版社,2010.
  • 3Designer S. StackPatch[EB/OL]. http://www. opwnwall. com/ linux.
  • 4Documentation for the PaX [EB/OL]. Project: http://pax. grsecurity. net/docs/.
  • 5PaX non-executable pages design & implementation[EB/OL], http://pax. grsecurity. net/docs/noexec.txt.
  • 6Return-to-libc Attack Lab[EB/OL]. http..//www, cis. syr. edu/ -wedu/seed/Labs/Vulnerability/Return_to_libc/Return_to_libc. pdf.
  • 7Advanced return-into-lib(c) exploits (PaX case study) [EB/ OL]. http://www. phrack. org/issues. html? issue= 58&id= 4 &mode= txt.
  • 8Shacham H. The Geometry of Innocent Flesh on the Bone:Retum-into-libc without Function Calls(on the x86)[C]//CCS'07 Proceedings of the 14th ACM conference on computer and communications security, 2007. New York, NY, USA.. ACM, 2007 : 552-561.
  • 9Buchanan E, Roemer R, Shacham H. When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC [C]//CCS' 08 Proceedings of the 15th ACM Conference on Computer and communications security, 2008. New York, NY, USA: ACM, 2008: 27-38.
  • 10Turing A M. On Computer Numbers, with an application the Entscheifungs problem, 1936.

共引文献24

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部