Netinfo Security ›› 2017, Vol. 17 ›› Issue (11): 62-66.doi: 10.3969/j.issn.1671-1122.2017.11.010

• Orginal Article • Previous Articles     Next Articles

Research on DLL Loading Vulnerability Defense Technology Based on Signature Verification

Fengyu LIU(), Wei XIE   

  1. College of Computer, National University of Defense Technology, Changsha Hunan 410073, China
  • Received:2017-08-28 Online:2017-11-20 Published:2020-05-12

Abstract:

The dynamic link library is an implementation of the shared library concept in the Windows operating system, which includes codes and data that can be simultaneously used in many programs. Although the dynamic link library provides a modular sharing mechanism for the operating system, its imperfect loading mechanism causes many security vulnerabilities such as DLL hijacking. This paper firstly proposes a technical solution to verify the DLL loading and defense DLL loading vulnerability attacks by the operating system callback mechanism, then implements and tests the technical solution on the platform of Windows 7 operating system, finally discusses the practicality, stability and scalability of the technical solution. The simulation results prove that the defense mechanism can effectively monitor the loading process of DLL files, and find out the loading behavior of malicious files in nearly real-time conditions.

Key words: drive programming, DLL loading vulnerability, callback mechanism

CLC Number: