Windows平台下ROP攻击缓解技术研究
[Abstract]:Internet is the most dynamic and innovative industry in the 21 century. It is deeply rooted in every corner of human society. People enjoy the convenient life brought by the Internet, but ignore the accompanying security problems. In recent years, network security incidents emerge in endlessly, such as the Google Northern Lights APT event, Hacking Team information leak event and Baidu application Wormhole vulnerability incident have caused great damage, from which we can see that the current Internet security situation is very serious. In security incidents, ROP attacks have attracted increasing attention from hackers and security researchers because they can bypass most of the current defense measures. In this paper, aiming at the serious situation of ROP attack in current vulnerability attack and defense, a new method of ROP attack mitigation is proposed based on the study of normal program jump, and the corresponding prototype system is designed and implemented. The main work of this paper is as follows: first, on the basis of debugger principle, this paper puts forward the analysis method of hot spot dynamic link library through the unique page daemon exception of Windows system. According to this method, the HMAT instruction analysis tool is implemented. The HMAT instruction analysis tool can analyze the execution characteristics of the program at the command level during the run time, and analyze some dynamic link libraries in the process separately according to the user's needs. On the basis of analyzing several software in Windows system, three kinds of indirect jump instructions of call,jmp and ret are studied in detail by using HMAT instruction analysis tool. It is found that the three kinds of indirect jump instructions are different from those under ROP attack during normal execution. By identifying the completeness of the three kinds of indirect jump during execution, we can find out whether the current program is attacked by ROP. Secondly, three problems that need to be faced in the process of detecting and defending ROP attacks are studied. They are when to detect in the process of program running, which points to detect and how to identify ROP attacks. On the basis of the traditional detection method, it is determined whether the current program is attacked or not when the key function is called, and the criteria of function selection are determined. Finally, the innovative proposal is put forward. The single-step debugging technique is used to identify each instruction executed and the completeness of indirect jump in the sequence of instructions is used to determine whether the instruction is currently under ROP attack. Thirdly, the ROP attack mitigation scheme is proposed based on the research results of three problems, and the prototype system is implemented according to the design scheme. In this paper, the realization goal of the mitigation system and the design of each module are described in detail. Finally, through three vulnerability samples, the prototype system of ROP attack mitigation is tested in detail. The test results show that the system can effectively defend against ROP attack.
【学位授予单位】:电子科技大学
【学位级别】:硕士
【学位授予年份】:2016
【分类号】:TP393.08
【相似文献】
相关期刊论文 前10条
1 林丽华;;让Windows Media Player的跳转列表不再贪污[J];电脑迷;2010年09期
2 梁阿磊;吴浩;李小勇;;动态二进制翻译中的跳转优化技术[J];四川大学学报(自然科学版);2007年06期
3 朱俊华;;一种高速的条件跳转指令硬件实现[J];计算机技术与发展;2008年07期
4 白锋,程旭;一种针对短循环的跳转隐藏技术[J];计算机工程与应用;2003年22期
5 罗文华;;基于Windows7环境下的跳转列表解析用户操作行为[J];警察技术;2014年03期
6 飘零雪;;Windows 7跳转列表延伸到所有程序[J];电脑迷;2010年13期
7 大江东去;;利用CCleaner快速清理跳转列表[J];电脑迷;2012年02期
8 齐宁;赵荣彩;;IA-64代码翻译中的跳转表恢复技术[J];计算机工程;2006年23期
9 苏铭,宋宗宇,赵荣彩,齐宁;IA-64二进制翻译中跳转表恢复技术[J];微计算机信息;2005年17期
10 刘曼;;使用跳转指令时应注意的问题[J];江西科学;2007年04期
相关重要报纸文章 前5条
1 彭茂山 黄贵清 林直友;Unix下子目录的模糊跳转[N];计算机世界;2001年
2 秤杆;轻松搞定 Windows 7的跳转列表[N];中国电脑教育报;2009年
3 北京 YATE;PowerPoint使用技巧[N];中国电脑教育报;2001年
4 本报评论员 付小为;归家之路浓缩国家社会变迁[N];长江日报;2014年
5 广西 可爱的木阿;给Flash作品加把锁[N];电脑报;2003年
相关硕士学位论文 前3条
1 许云清;Windows平台下ROP攻击缓解技术研究[D];电子科技大学;2016年
2 孙廷韬;动态二进制翻译中跳转分析与优化[D];上海交通大学;2010年
3 朱艳坤;双稳态层合板跳转过程分析与新型柔性蜂窝结构性能评价[D];大连理工大学;2014年
,本文编号:2366804
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2366804.html