基于异常控制流识别的漏洞利用攻击检测方法
文献类型:期刊论文
作者 | 王明华 ; 应凌云 ; 冯登国 |
刊名 | 通信学报
![]() |
出版日期 | 2014 |
卷号 | 35期号:9页码:20-31 |
关键词 | 软件漏洞 漏洞利用 攻击检测 地址随机化 数据执行保护 software vulnerability exploit attack detection address space layout randomization data execution protection |
ISSN号 | 1000436X |
其他题名 | Exploit detection based on illegal control flow transfers identification |
通讯作者 | Wang, Ming-Hua |
中文摘要 | 为应对APT等漏洞利用攻击的问题,提出了一种基于异常控制流识别的漏洞利用攻击检测方法.该方法通过对目标程序的静态分析和动态执行监测,构建完整的安全执行轮廓,并限定控制流转移的合法目标,在函数调用、函数返回和跳转进行控制流转移时,检查目标地址的合法性,将异常控制流转移判定为漏洞攻击,并捕获完整的攻击步骤.实验结果表明,该方法能够准确检测到漏洞利用攻击,并具备良好的运行效率,可以作为漏洞利用攻击的实时检测方案. |
英文摘要 | In order to deal with exploit attacks such as APT, an approach was proposed to detect exploits based on illegal control flow transfers identification. Both static and dynamic analysis methods were performed to construct the CFSO (control flow safety outline), which was used to restrict the targets of control flow transfers occurred during the target program's running. When a call/ret/jmp was about to execute, the target was checked according to the CFSO. The illegal control flow transfer is considered as an exploit attack and all the following attacking steps could be captured. The experiment also showed that proposed method had decent overhead and could be applied to detect exploits online. |
收录类别 | EI |
语种 | 中文 |
公开日期 | 2014-12-16 |
源URL | [http://ir.iscas.ac.cn/handle/311060/16775] ![]() |
专题 | 软件研究所_软件所图书馆_期刊论文 |
推荐引用方式 GB/T 7714 | 王明华,应凌云,冯登国. 基于异常控制流识别的漏洞利用攻击检测方法[J]. 通信学报,2014,35(9):20-31. |
APA | 王明华,应凌云,&冯登国.(2014).基于异常控制流识别的漏洞利用攻击检测方法.通信学报,35(9),20-31. |
MLA | 王明华,et al."基于异常控制流识别的漏洞利用攻击检测方法".通信学报 35.9(2014):20-31. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。