期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
UEFI固件Double-fetch条件竞争漏洞模糊测试技术研究
1
作者 尹嘉伟 史记 +3 位作者 张禹 戴戈 王琛 湛蓝蓝 《网络安全与数据治理》 2025年第4期19-23,51,共6页
基于统一可扩展固件接口(Unified Extensible Firmware Interface,UEFI)标准实现的固件已广泛应用于个人计算机、云服务器以及网络设备,UEFI固件服务漏洞会引发严重安全威胁,模糊测试是检测漏洞的主要手段。然而,受限于传统内存类漏洞机... 基于统一可扩展固件接口(Unified Extensible Firmware Interface,UEFI)标准实现的固件已广泛应用于个人计算机、云服务器以及网络设备,UEFI固件服务漏洞会引发严重安全威胁,模糊测试是检测漏洞的主要手段。然而,受限于传统内存类漏洞机理,当前UEFI固件模糊测试方法无法检测诸如UEFI固件Double-fetch条件竞争漏洞等特殊类型漏洞。提出了Double-fetch信息引导的UEFI固件服务模糊测试方法,并实现了原型系统UEFIDFFuzzer,通过对来自英特尔厂商的114个UEFI固件服务驱动进行测试,UEFIDFFuzzer发现了两个现有UEFI模糊测试工具RSFuzzer以及静态分析工具efiXplorer没有发现的UEFI固件Double-fetch零日漏洞。 展开更多
关键词 UEFI double-fetch漏洞 模糊测试
在线阅读 下载PDF
Untrusted Hardware Causes Double-Fetch Problems in the I/O Memory
2
作者 Kai Lu Peng-Fei Wang +1 位作者 Gen Li Xu Zhou 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第3期587-602,共16页
The double fetch problem occurs when the data is maliciously changed between two kernel reads of the supposedly same data, which can cause serious security problems in the kernel. Previous research focused on the doub... The double fetch problem occurs when the data is maliciously changed between two kernel reads of the supposedly same data, which can cause serious security problems in the kernel. Previous research focused on the double fetches between the kernel and user applications. In this paper, we present the first dedicated study of the double fetch problem between the kernel and peripheral devices (aka. the hardware double fetch). Operating systems communicate with peripheral devices by reading from and writing to the device mapped I/O (input and output) memory. Owing to the lack of effective validation of the attached hardware, compromised hardware could flip the data between two reads of the same I/O memory address, causing a double fetch problem. We propose a static pattern-matching approach to identify the hardware double fetches from the Linux kernel. Our approach can analyze the entire kernel without relying on the corresponding hardware. The results are categorized and each category is analyzed using case studies to discuss the possibility of causing bugs. We also find four previously unknown double-fetch vulnerabilities, which have been confirmed and fixed after reporting them to the maintainers. 展开更多
关键词 hardware double fetch double-fetch bug I/O memory peripheral device double-fetch vulnerability
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部