信息网络安全 ›› 2014, Vol. 14 ›› Issue (12): 76-82.doi: 10.3969/j.issn.1671-1122.2014.12.016

Previous Articles     Next Articles

The Research on Vulnerability Mitigation in Memory

HE Ying-rui1, SHI Ji1, ZHANG Tao2, WEN Wei-ping2   

  1. 1. School of Network Security, People's Public Security of China,Beijing 100037,China;
    2. School of Software & Microelectronics, Peking University, Beijing 102600,China
  • Received:2014-11-15 Online:2014-12-15

Abstract: With the technology of finding vulnerabilities in software getting more mature, the total number of bugs is increasing yearly. In order to improve the security of memory protection, in terms of operating system and compiler, measures taken by OS to mitigate exploit are getting more perfect. This article describes some of the key mitigations, including GS options, SEH, Heap protection, DEP, and ASLR. The GS compiler technology and SEH security authentication mechanism can effectively detect and prevent most stack-based overflow attacks; Heap protection provides more restrictions aiming at stack overflow; DEP can perform additional memory checks to prevent malicious code executing in the system; ASLR helps to prevent buffer overflow attacks by randomizing the key address.The article also points out the drawbacks and introduces some method to defeat these mitigations from the views of attackers. Aiming at the vulnerability mitigation technology, the article points out it must be considered how to cover the shortage on resisting the attack of composite vectors and how to improve and perfect the bypassing protection in the future.

Key words: memory security, vulnerability mitigation, bypassing

CLC Number: