期刊文献+

基于签名认证的DLL加载漏洞防御技术研究 被引量:3

Research on DLL Loading Vulnerability Defense Technology Based on Signature Verification
下载PDF
导出
摘要 动态链接库(Dynamic Link Library,DLL)是Windows操作系统中共享函数库概念的一种实现方式,其中包含可供多个程序同时使用的代码和数据。动态链接库虽然为操作系统提供模块化的共享机制,但由于其加载机制不完善,衍生出DLL劫持等安全漏洞。文章首先提出一种利用操作系统回调机制进行DLL加载认证以抵御DLL加载漏洞攻击的技术方案;然后在Windows 7操作系统平台上实现和验证;最后分析评述该方法的实用性、稳定性和扩展性。仿真实验结果证明,文章提出的防御机制能够有效监控DLL文件的加载过程,并在近实时环境条件下监测到恶意文件加载行为。 The dynamic link library is an implementation of the shared library concept m the Windows operating system,which includes codes and data that can be simultaneously used m many programs. Although the dynamic link libraty provides a modular sharing mechanism for the operating system,its imperfect loading mechanism causes many security vulnerabilities such as DLL hijacking. This paper firstty proposes a technical solution to verify the DLL loading and defense DLL loading vulnerability attacks by the operating system callback mechanism,then implements and tests the technical solution on the platform of Windows 7 operating system,finally discusses the practicality, stability and scalability of the technical solution. The simulation results prove that the defense mechanism can effectivey monitor the loading process of DLL files, and find out the loading behavior of malicious files m nearly real-time conditions.
作者 刘峰宇 解炜 LIU Fengyu;XIEWei(College of Computer, National University of Defense Technology, Changsha Hunan 410013, China)
出处 《信息网络安全》 CSCD 2017年第11期62-66,共5页 Netinfo Security
基金 国家自然科学基金[61472437]
关键词 驱动编程 DLL加载漏洞 回调机制 drive programming DLL loading vulnerability callback mechanism
  • 相关文献

参考文献4

二级参考文献52

  • 1张保稳,施军,张晖.缓冲区溢出漏洞检测技术研究进展[J].计算机应用与软件,2006,23(1):3-4. 被引量:4
  • 2段刚.加密与解密(第三版)[M].北京:电子工业出版社,2008:102-103,121-126,392-395,321-323.
  • 3王清.Oday安全:软件漏洞分析技术[M].北京:电子工业出版社,2008.
  • 4刘金红,陆余良.主题网络爬虫研究综述[J].计算机应用研究,2007,24(10):26-29. 被引量:132
  • 5Microsoft Corporation.Dynamic link library[Z/OL].(2012-08-28),http://msdn.microsoft.com/en-us/library/windows/desktop/ms682589%28v=vs.85%29.aspx.
  • 6Microsoft Corporation.Dynamic link library search order[Z/OL].(2012-8-28),http://msdn.microsoft.com/zh-cn/library/ms682586(v=VS.85).aspx.
  • 7Exploit Db.DLL hijack vulnerability[Z/OL].(2012-08-28),http://www.exploit-db.com/dll-hijacking-vulnerable-applications/.
  • 8Microsoft Corporation.Data execution protection[Z/OL].(2012-08-28),http://technet.microsoft.com/en-us/library/cc738483(WS.10).aspx.
  • 9Cowan C,Pu C,Maier D,et al.Automatic detection andprevention of buffer-overflow attacks[C] //Proceedings ofthe 7th USENIX Security Symposium.San Antonio,USA:USENIX,1998:63-78.
  • 10Bhatkar S,Duvarney D,Sekar R.Address obfuscation:Anefficient approach to combat a broad range of memory errorexploits[C] //Proceedings of 12th USENIX SecuritySymposium.Washington DC,USA:USENIX,2003:105-120.

共引文献21

同被引文献18

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部