信息网络安全 ›› 2014, Vol. 14 ›› Issue (12): 76-82.doi: 10.3969/j.issn.1671-1122.2014.12.016

• 理论研究 • 上一篇    下一篇

基于内存的漏洞缓解关键技术研究

贺滢睿1, 史记1, 张涛2, 文伟平2   

  1. 1.中国公安大学网络安全保卫学院,北京 100037;
    2.北京大学软件与微电子学院,北京 102600
  • 收稿日期:2014-11-15 出版日期:2014-12-15
  • 通讯作者: 贺滢睿 heyingrui415@163.com
  • 作者简介:贺滢睿(1991-),女,新疆,硕士研究生,主要研究方向:信息对抗、网络安全与防范;史记(1990-),男,北京,硕士研究生,主要研究方向:漏洞挖掘与利用、软件安全漏洞分析;张涛(1987-),男,江西,硕士,主要研究方向:系统与网络安全、软件安全漏洞分析;文伟平(1976-),男,湖南,副教授,博士,主要研究方向:网络攻击与防范、恶意代码研究、信息系统逆向工程和可信计算技术等。
  • 基金资助:
    国家自然科学基金[61170282]

The Research on Vulnerability Mitigation in Memory

HE Ying-rui1, SHI Ji1, ZHANG Tao2, WEN Wei-ping2   

  1. 1. School of Network Security, People's Public Security of China,Beijing 100037,China;
    2. School of Software & Microelectronics, Peking University, Beijing 102600,China
  • Received:2014-11-15 Online:2014-12-15

摘要: 随着漏洞挖掘技术日渐成熟,每年新增漏洞数量逐步增加。从操作系统以及编译器层面来说,为了提高内存保护的安全性,对抗漏洞利用的缓解措施也在不断完善。文章介绍了近年来比较成熟的基于内存的漏洞关键缓解技术,包括GS编译选项技术、SEH安全校验机制、堆数据保护机制、DEP技术以及ASLR技术。GS编译选项技术和SEH安全校验机制能够有效遏制针对栈数据的攻击;堆数据保护机制为堆溢出增加了更多限制;DEP技术能够对内存执行额外检查以防止恶意代码在系统中执行;ASLR技术通过对关键地址的随机化使一些堆栈溢出手段失效。文章还指出了这些防护措施所存在的不足,并据此从攻击者的角度介绍了针对这几种缓解措施的攻击思路。针对漏洞缓解技术,文章指出未来必须考虑的是如何弥补在抵御复合向量攻击方面的不足,如何完善旁路保护。

关键词: 内存安全, 漏洞缓解, 绕过

Abstract: With the technology of finding vulnerabilities in software getting more mature, the total number of bugs is increasing yearly. In order to improve the security of memory protection, in terms of operating system and compiler, measures taken by OS to mitigate exploit are getting more perfect. This article describes some of the key mitigations, including GS options, SEH, Heap protection, DEP, and ASLR. The GS compiler technology and SEH security authentication mechanism can effectively detect and prevent most stack-based overflow attacks; Heap protection provides more restrictions aiming at stack overflow; DEP can perform additional memory checks to prevent malicious code executing in the system; ASLR helps to prevent buffer overflow attacks by randomizing the key address.The article also points out the drawbacks and introduces some method to defeat these mitigations from the views of attackers. Aiming at the vulnerability mitigation technology, the article points out it must be considered how to cover the shortage on resisting the attack of composite vectors and how to improve and perfect the bypassing protection in the future.

Key words: memory security, vulnerability mitigation, bypassing

中图分类号: