信息网络安全 ›› 2014, Vol. 15 ›› Issue (11): 59-65.doi: 10.3969/j.issn.1671-1122.2014.11.010

• • 上一篇    

基于Windows的软件安全典型漏洞利用策略探索与实践

关通(), 任馥荔, 文伟平, 张浩   

  1. 北京大学软件与微电子学院,北京 102600
  • 收稿日期:2014-08-15 出版日期:2014-11-01 发布日期:2020-05-18
  • 作者简介:

    作者简介: 关通(1989-),男,黑龙江,硕士研究生,主要研究方向:系统与网络安全、软件安全漏洞分析;任馥荔(1989-),女,山东,硕士研究生,主要研究方向:软件测试与质量保证、软件安全漏洞分析;文伟平(1976-),男,湖南,副教授,博士,主要研究方向:网络攻击与防范、恶意代码研究、信息系统逆向工程和可信计算技术等;张浩(1988-),女,黑龙江,硕士研究生,主要研究方向:系统与网络安全、软件安全漏洞分析。

  • 基金资助:
    国家自然科学基金[61170282]

Exploration and Practice of Using Typical Software Vulnerabilities Based on Windows

Tong GUAN(), Fu-li REN, Wei-ping WEN, Hao ZHANG   

  1. School of Software & Microelectronics, Peking University, Beijing 102600, China
  • Received:2014-08-15 Online:2014-11-01 Published:2020-05-18

摘要:

随着全球信息化的迅猛发展,计算机软件已成为世界经济、科技、军事和社会发展的重要引擎。信息安全的核心在于其所依附的操作系统的安全机制以及软件本身存在的漏洞。软件漏洞本身无法构成攻击,软件漏洞利用使得把漏洞转化为攻击变为可能。文章立足于Windows操作系统,主要分析了一些常用软件的典型漏洞原理以及常见的利用方法,比较了不同利用方法在不同环境下的性能优劣,并简单分析了Windows的安全机制对软件的防护作用以及对软件漏洞利用的阻碍作用。文章着重对几种典型漏洞进行了软件漏洞利用的探索和实践,并使用当前流行的对安全机制的绕过方法分析了Windows几种安全机制的脆弱性。

关键词: 软件漏洞, 漏洞利用, 安全机制, 绕过方法, 软件安全

Abstract:

With the rapid development of the global information technology, computer software has become the important engine of the world economy, science and technology, military and social development. The core of information security is attached to the security mechanism of the operating system and software vulnerabilities. Software vulnerability itself can not constitute attack, software vulnerability exploiting make the attack possible. This article is based on the Windows operating system, mainly analyzes the principles of some typical software vulnerabilities as well as the common ways to exploit software vulnerabilities, comparing them. in different environment.The article also simply analyzes the protective effect to software security and the hinder to software vulnerability exploiting of Windows security mechanisms. The article emphatically does some explorations and practices on exploiting several typical software vulnerabilities, analyzing the fragility of Windows security mechanisms by using the current popular methods of bypassing security mechanisms.

Key words: software vulnerabilities, vulnerability exploiting, security mechanism, bypassing method, software security

中图分类号: