• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

内存地址泄漏分析与防御

傅建明, 刘秀文, 汤毅, 李鹏伟

傅建明, 刘秀文, 汤毅, 李鹏伟. 内存地址泄漏分析与防御[J]. 计算机研究与发展, 2016, 53(8): 1829-1849. DOI: 10.7544/issn1000-1239.2016.20150526
引用本文: 傅建明, 刘秀文, 汤毅, 李鹏伟. 内存地址泄漏分析与防御[J]. 计算机研究与发展, 2016, 53(8): 1829-1849. DOI: 10.7544/issn1000-1239.2016.20150526
Fu Jianming, Liu Xiuwen, Tang Yi, Li Pengwei. Survey of Memory Address Leakage and Its Defense[J]. Journal of Computer Research and Development, 2016, 53(8): 1829-1849. DOI: 10.7544/issn1000-1239.2016.20150526
Citation: Fu Jianming, Liu Xiuwen, Tang Yi, Li Pengwei. Survey of Memory Address Leakage and Its Defense[J]. Journal of Computer Research and Development, 2016, 53(8): 1829-1849. DOI: 10.7544/issn1000-1239.2016.20150526
傅建明, 刘秀文, 汤毅, 李鹏伟. 内存地址泄漏分析与防御[J]. 计算机研究与发展, 2016, 53(8): 1829-1849. CSTR: 32373.14.issn1000-1239.2016.20150526
引用本文: 傅建明, 刘秀文, 汤毅, 李鹏伟. 内存地址泄漏分析与防御[J]. 计算机研究与发展, 2016, 53(8): 1829-1849. CSTR: 32373.14.issn1000-1239.2016.20150526
Fu Jianming, Liu Xiuwen, Tang Yi, Li Pengwei. Survey of Memory Address Leakage and Its Defense[J]. Journal of Computer Research and Development, 2016, 53(8): 1829-1849. CSTR: 32373.14.issn1000-1239.2016.20150526
Citation: Fu Jianming, Liu Xiuwen, Tang Yi, Li Pengwei. Survey of Memory Address Leakage and Its Defense[J]. Journal of Computer Research and Development, 2016, 53(8): 1829-1849. CSTR: 32373.14.issn1000-1239.2016.20150526

内存地址泄漏分析与防御

基金项目: 国家自然科学基金项目(61373168,61202387,61332019);高等学校博士学科点专项科研基金项目(20120141110002)
详细信息
  • 中图分类号: TP391

Survey of Memory Address Leakage and Its Defense

  • 摘要: 高级持续性威胁(advanced persistent threat, APT)攻击通常会利用内存地址泄漏绕过地址空间布局随机化(address space layout randomization, ASLR)、利用面向返回编程技术(return-oriented programming, ROP)绕过数据执行保护(data execution prevention, DEP).针对内存地址泄漏漏洞,以漏洞实例为样本,剖析了各种造成越界内存访问的指针或对象的非法操作,以及侧信道信息泄漏漏洞,并基于造成内存泄漏的过程,给出了相应的漏洞分类.同时,从漏洞利用和攻击的过程出发,总结和归纳了内存布局随机化、内存越界读写保护、内存对象内容保护、内存对象地址随机化等对抗内存地址泄漏的防御方法,从而达到内存布局看不清、内存对象读不到、内存对象内容读不懂、关键内存地址猜不准的保护目的.最后,提出从程序设计角度提供对内存布局随机化、代码地址随机化、内存对象保护等的支持,同时与操作系统建立协作防御机制,从而构建纵深和立体的安全防御体系.
    Abstract: With memory address leakage, an attacker can bypass ALSR(address space layout randomization) mechanism, deploy ROP(return-oriented programming) chains to close the DEP (data execution prevention), and divert the program to execute Shellcode. With regard to memory address leakage, this paper gathers the related information of vulnerability instances, presents the classification of vulnerabilities resulting in memory address leakage based on the procedure of memory leakage. The paper analyzes all kinds of illegal operations of pointer or object which cause the operation of cross-border memory access, as well as side-channel information leakage.In the meantime, this paper divids the defense methods of memory address leakage into four categories according to the procedure of memory corruption attacks, including memory layout randomization, object border protection, object content protection, and the critical address information randomization. And these protections make memory layout vague, memory object unavailable, memory object unreadable and critical memory address untraceable. Finally, this paper points out that we need to provide support of memory layout randomization, fine-grained memory address randomization and object content protection in perspective of programming design, adapting the operating system to establish collaborative defense mechanism in order to build robust defense system in depth.
计量
  • 文章访问数:  1709
  • HTML全文浏览量:  7
  • PDF下载量:  729
  • 被引次数: 0
出版历程
  • 发布日期:  2016-07-31

目录

    /

    返回文章
    返回