• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Fu Jianming, Liu Xiuwen, Tang Yi, Li Pengwei. Survey of Memory Address Leakage and Its Defense[J]. Journal of Computer Research and Development, 2016, 53(8): 1829-1849. DOI: 10.7544/issn1000-1239.2016.20150526
Citation: Fu Jianming, Liu Xiuwen, Tang Yi, Li Pengwei. Survey of Memory Address Leakage and Its Defense[J]. Journal of Computer Research and Development, 2016, 53(8): 1829-1849. DOI: 10.7544/issn1000-1239.2016.20150526

Survey of Memory Address Leakage and Its Defense

More Information
  • Published Date: July 31, 2016
  • With memory address leakage, an attacker can bypass ALSR(address space layout randomization) mechanism, deploy ROP(return-oriented programming) chains to close the DEP (data execution prevention), and divert the program to execute Shellcode. With regard to memory address leakage, this paper gathers the related information of vulnerability instances, presents the classification of vulnerabilities resulting in memory address leakage based on the procedure of memory leakage. The paper analyzes all kinds of illegal operations of pointer or object which cause the operation of cross-border memory access, as well as side-channel information leakage.In the meantime, this paper divids the defense methods of memory address leakage into four categories according to the procedure of memory corruption attacks, including memory layout randomization, object border protection, object content protection, and the critical address information randomization. And these protections make memory layout vague, memory object unavailable, memory object unreadable and critical memory address untraceable. Finally, this paper points out that we need to provide support of memory layout randomization, fine-grained memory address randomization and object content protection in perspective of programming design, adapting the operating system to establish collaborative defense mechanism in order to build robust defense system in depth.
  • Related Articles

    [1]Zhao Jingxin, Yue Xinghui, Feng Chongpeng, Zhang Jing, Li Yin, Wang Na, Ren Jiadong, Zhang Haoxing, Wu Gaofei, Zhu Xiaoyan, Zhang Yuqing. Survey of Data Privacy Security Based on General Data Protection Regulation[J]. Journal of Computer Research and Development, 2022, 59(10): 2130-2163. DOI: 10.7544/issn1000-1239.20220800
    [2]Chen Yan, Gao Zhenguo, Wang Haijun, Ouyang Yun, Gou Jin. Node Localization Protocol with Adjustable Privacy Protection Capability[J]. Journal of Computer Research and Development, 2022, 59(9): 2075-2088. DOI: 10.7544/issn1000-1239.20210009
    [3]Fan Xuefeng, Zhou Xiaoyi, Zhu Bingbing, Dong Jinwei, Niu Jun, Wang He. Survey of Copyright Protection Schemes Based on DNN Model[J]. Journal of Computer Research and Development, 2022, 59(5): 953-977. DOI: 10.7544/issn1000-1239.20211115
    [4]Ding Yong, Li Jiahui, Tang Shijie, Wang Huiyong. Template Protection of Speaker Recognition Based on Random Mapping Technology[J]. Journal of Computer Research and Development, 2020, 57(10): 2201-2208. DOI: 10.7544/issn1000-1239.2020.20200474
    [5]Wang Huiyong, Tang Shijie, Ding Yong, Wang Yujue, Li Jiahui. Survey on Biometrics Template Protection[J]. Journal of Computer Research and Development, 2020, 57(5): 1003-1021. DOI: 10.7544/issn1000-1239.2020.20190371
    [6]Wang Ye, Li Qingbao, Zeng Guangyu, Chen Zhifeng. A Code Reuse Attack Protection Technique Based on Code Anti-Leakage[J]. Journal of Computer Research and Development, 2016, 53(10): 2277-2287. DOI: 10.7544/issn1000-1239.2016.20160423
    [7]Yang Tao, Wang Yonggang, Tang Liyong, Kong Lingbo, Hu Jianbin, Chen Zhong. A Practical Dynamic Integrity Protection Model[J]. Journal of Computer Research and Development, 2013, 50(10): 2082-2091.
    [8]Chen Ping, Xing Xiao, Xin Zhi, Wang Yi, Mao Bing, and Xie Li. Protecting Programs Based on Randomizing the Encapsulated Structure[J]. Journal of Computer Research and Development, 2011, 48(12): 2227-2234.
    [9]Yang Gang, Wang Wencheng, Wu Enhua. Texture Synthesis by the Border Image[J]. Journal of Computer Research and Development, 2005, 42(12): 2118-2125.
    [10]Huo Longshe, Gao Wen, Huang Qingming, Xie Jianguo. Error Protection Algorithms for Scalable Multimedia Transmission: A Survey[J]. Journal of Computer Research and Development, 2005, 42(11): 1954-1961.

Catalog

    Article views (1709) PDF downloads (729) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return