当前位置:主页 > 科技论文 > 软件论文 >

基于Canary复用的SSP安全缺陷分析

发布时间:2018-03-07 05:36

  本文选题:栈保护机制 切入点:Canary复用 出处:《北京邮电大学学报》2017年S1期  论文类型:期刊论文


【摘要】:核保护机制(SSP)是缓解栈缓冲区溢出漏洞攻击最有效的安全机制,通过系统生成的随机数保证栈不被修改,目前关于SSP机制的绕过技术主要是基于暴力破解.为此,揭示了一种可以泄露随机数的安全缺陷模型,由于操作系统没有及时清空死亡栈帧,导致随机数可能存在于无效空间,利用此特性的绕过方式被称为Canary复用.实验验证了这种安全缺陷的可利用性与稳定性,基于此特点,提出了两种有效的解决方案.
[Abstract]:The nuclear protection mechanism (SSP) is the most effective security mechanism to mitigate the stack buffer overflow vulnerability attack. The random number generated by the system ensures that the stack will not be modified. At present, the bypass technology of the SSP mechanism is mainly based on brute force cracking. This paper presents a security defect model that can leak random numbers. Because the operating system does not clear the dead stack frames in time, the random numbers may exist in invalid space. The bypass method using this property is called Canary reuse. The availability and stability of this security defect are verified by experiments. Based on this characteristic, two effective solutions are proposed.
【作者单位】: 江南计算技术研究所;
【分类号】:TP309


本文编号:1578179

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/1578179.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户c4a60***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com