浏览全部资源
扫码关注微信
1. 数学工程与先进计算国家重点实验室,河南 郑州 450001
2. 国家数字交换系统工程技术研究中心,河南 郑州 450002
[ "潘传幸(1996- ),男,山东梁山人,信息工程大学博士生,主要研究方向为主动防御、拟态防御等。" ]
[ "张铮(1975- ),男,湖北黄冈人,博士,信息工程大学教授,主要研究方向为高性能计算、拟态防御等。" ]
[ "马博林(1993- ),男,山东青岛人,信息工程大学博士生,主要研究方向为主动防御、多变体执行技术、拟态防御等。" ]
[ "姚远(1972- ),男,湖北武汉人,博士,信息工程大学教授,主要研究方向为先进计算、并行处理等。" ]
[ "季新生(1968- ),男,江苏南通人,博士,国家数字交换系统工程技术研究中心教授、博士生导师,主要研究方向为移动通信网络、拟态安全等。" ]
网络出版日期:2021-01,
纸质出版日期:2021-01-25
移动端阅览
潘传幸, 张铮, 马博林, 等. 面向进程控制流劫持攻击的拟态防御方法[J]. 通信学报, 2021,42(1):37-47.
Chuanxing PAN, Zheng ZHANG, Bolin MA, et al. Method against process control-flow hijacking based on mimic defense[J]. Journal on communications, 2021, 42(1): 37-47.
潘传幸, 张铮, 马博林, 等. 面向进程控制流劫持攻击的拟态防御方法[J]. 通信学报, 2021,42(1):37-47. DOI: 10.11959/j.issn.1000-436x.2021013.
Chuanxing PAN, Zheng ZHANG, Bolin MA, et al. Method against process control-flow hijacking based on mimic defense[J]. Journal on communications, 2021, 42(1): 37-47. DOI: 10.11959/j.issn.1000-436x.2021013.
为了防御进程控制流劫持攻击,从漏洞利用的角度对攻击过程建立了威胁模型,提出了截断关键漏洞利用环节的“要塞”防御。在研究拟态防御原理的基础上提出了进程的拟态执行模型,并对该模型进行了分析与有效性证明,拟态执行能够有效截断控制流劫持的攻击实施过程;实现了拟态执行的原型系统 MimicBox,并对MimicBox进行了有效性验证实验、性能测试和对比评估。有效性验证实验表明,MimicBox可以有效防御绝大部分基于已知类型二进制漏洞的控制流劫持攻击;性能评估结果表明,MimicBox对CPU密集型程序带来的额外性能开销不会超过13%;对比评估结果表明,拟态执行相对于控制流完整性防御来说,是一种较有效实用的主动防御方案。
To defeat the attack of process control flow hijacking
a threat model was established from the point of vulnerability utilization
and the fortress defense to cut off the key vulnerability utilization path was proposed.On the basis of studying the principle of mimic defense
a threat model of process mimic execution was proposed
and the threat model was analyzed and proved to be effective.Mimic execution could effectively cut off the attack path of control flow hijacking.The ptototype of mimic execution
MimicBox
was implemented.The validation experiment shows that MimicBox can effectively defend against most control flow hijacking attacks based on known binary vulnerabilities.The performance evaluation result shows that the overhead MimicBox lead to is less than 13% on CPU-intensive programs.The Comparative evaluation result shows that mimic execution is a more effective and practical active defense method compared with control flow integrity.
COWAN C , WAGLE P , PU C , et al . Buffer overflows:attacks and defenses for the vulnerability of the decade [C ] // DARPA Information Survivablity Conference and Exception . Piscataway:IEEE Press , 2000 : 119 - 129 .
王丰峰 , 张涛 , 徐伟光 , 等 . 进程控制流劫持攻击与防御技术综述 [J ] . 信息安全学报 , 2019 , 5 ( 6 ): 10 - 20 .
WANG F F , ZHANG T , XU W G , et al . Overview of control-flow hijacking attack and defense techniques for process [J ] . Chinese Journal of Network and Information Security , 2019 , 5 ( 6 ): 10 - 20 .
MITRE . 2020 CWE top 25 most dangerous software errors [R ] .(2020-08-20) [ 2020 - 08 - 26 ]
VEN A . New security enhancements in red hat enterprise linux v.3,update 3 [R ] . 2004 .
COWAN C , PU C , MAIER D , et al . Stackguard:automatic adaptive detection and prevention of buffer-overflow attacks [J ] . Usenix Security , 1998 , 98 : 63 - 78 .
PaX Team . PaX ASLR [R ] . 2003 .
ROEMER R , BUCHANAN E , SHACHAM H , et al . Return-oriented programming:systems,languages,and applications [J ] . ACM Transactions on Information and System Security , 2012 , 15 ( 1 ): 1 - 34 .
乔向东 , 郭戎潇 , 赵勇 . 代码复用对抗技术研究进展 [J ] . 网络与信息安全学报 , 2018 , 4 ( 3 ): 1 - 12 .
QIAO X D , GUO R X , ZHAO Y . Research progress in code reuse attacking and defending [J ] . Chinese Journal of Network and Information Security , 2018 , 4 ( 3 ): 1 - 12 .
邢骁 , 陈平 , 丁文彪 , 等 . BIOP:自动构造增强型ROP攻击 [J ] . 计算机学报 , 2014 , 37 ( 5 ): 1111 - 1123 .
XING X , CHENG P , DING W B , et al . BIOP:automatic construction of enhanced ROP attack [J ] . Chinese Journal of Computers , 2014 , 37 ( 5 ): 1111 - 1123 .
陈振伟 , 孙歆 . 使用ROP技术突破Linux的NX防护研究 [J ] . 网络空间安全 , 2018 , 9 ( 2 ): 64 - 69 .
CHEN Z W , SUN X . Research on bypassing the NX protection of Linux with ROP [J ] . Cyberspace Security , 2018 , 9 ( 2 ): 64 - 69 .
EVTYUSHKIN D , PONOMAREV D , ABU-GHAZALEH N . Jump over ASLR:attacking branch predictors to bypass ASLR [C ] // IEEE/ACM International Symposium on Microarchitecture . New York:ACM Press , 2016 : 1 - 13 .
武成岗 , 李建军 . 控制流完整性的发展历程 [J ] . 中国教育网络 , 2016 ( 4 ): 52 - 55 .
WU C C , LI J J . The evolution of control flow integrity [J ] . China Education Network , 2016 ( 4 ): 52 - 55 .
SAYEED S , MARCO-GISBERT H . On the effectiveness of control-flow integrity against modern attack techniques [M ] . Berlin : Springer , 2019 .
HU H , SHINDE S , ADRIAN S , et al . Data-oriented programming:on the expressiveness of non-control data attacks [C ] // 2016 IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 2016 : 969 - 986 .
邬江兴 . 网咯空间内生安全——拟态防御与广义鲁棒控制(上册) [M ] . 北京 : 科学出版社 , 2020 .
WU J X . Endogenous security of cyber space:mimic defense and generalized robust control (volume 1) [M ] . Beijing : Science Press , 2020 .
邬江兴 . 网咯空间内生安全——拟态防御与广义鲁棒控制(下册) [M ] . 北京 : 科学出版社 , 2020 .
WU J X . Endogenous security of cyber space:mimic defense and generalized robust control (volume 2) [M ] . Beijing : Science Press , 2020 .
邬江兴 . 网络空间拟态防御研究 [J ] . 信息安全学报 , 2016 , 1 ( 4 ): 1 - 10 .
WU J X . Research on cyber mimic defense [J ] . Journal of Cyber Security , 2016 , 1 ( 4 ): 1 - 10 .
仝青 , 张铮 , 张为华 , 等 . 拟态防御 Web 服务器设计与实现 [J ] . 软件学报 , 2017 , 28 ( 4 ): 883 - 897 .
TONG Q , ZHANG Z , ZHANG W H , et al . Design and implemention of mimic defense Web server [J ] . Journal of Software , 2017 , 28 ( 4 ): 883 - 897 .
张铮 , 马博林 , 邬江兴 . Web 服务器拟态防御原理验证系统测试与分析 [J ] . 信息安全学报 , 2016 , 2 ( 1 ): 13 - 28 .
ZHANG Z , MA B L , WU J X . The test and analysis of prototype of mimic defense in Web servers [J ] . Journal of Cyber Security , 2017 , 2 ( 1 ): 13 - 28 .
曾永瑞 , 李喆 . Linux 二进制漏洞利用——突破系统防御的关键技术 [J ] . 信息安全研究 , 2018 , 4 ( 9 ): 806 - 818 .
ZENG Y R , LI Z . Linux binary exploit——The key technology of breaking through the system defense [J ] . Journal of Information Security Research , 2018 , 4 ( 9 ): 806 - 818 .
裴中煜 , 张超 , 段海新 . Glibc堆利用的若干方法 [J ] . 信息安全学报 , 2018 , 3 ( 1 ): 1 - 15 .
PEI Z Y , ZHANG C , DUAN H X . Serval methods of exploiting glic heap [J ] . Journal of Cyber Security , 2018 , 3 ( 1 ): 1 - 15 .
第三届“强网”拟态防御国际精英挑战赛在南京开幕 [N ] . 2020 - 06 - 19 .
The 3rd “strong net” mimic defense international elite challenge opens in Nanjing [N ] . 2020 - 06 - 19 .
邬江兴 . 加快推进网络安全学科竞赛创新发展 [N ] . 解放军报 , 2020 - 06 - 19 .
WU J X . Accelerate the innovation and development of cybersecurity discripline competition [N ] . PLA Daily , 2020 - 06 - 19 .
MARTN A , . Control-flow integrity [C ] // Proceedings of the 12th ACM Conference on Computer and Communications Security . New York:ACM Press , 2005 : 340 - 353 .
PAPPAS V , POLYCHRONAKIS M , KEROMYTIS A D . Transparent ROP exploit mitigation using indirect branch tracing [C ] // Usenix Conference on Security . Berkeley:USENIX Association , 2013 : 447 - 462 .
COUDRAY T , FONTAINE A , CHIFFLIER P . PICON:control flow integrity on LLVM IR [C ] // Symposium on Security of Information on and Communication Technology .[S.n.:s.l. ] , 2015 : 1 - 6 .
帕尔哈提江·斯迪克 , 马建峰 , 孙聪 . 一种面向二进制的细粒度控制流完整性方法 [J ] . 计算机科学 , 2019 , 46 ( S2 ): 417 - 420 , 432 .
SIDIKE PA-ER H T J , MA J F , SUN C . Fine-graine control flow integrity method on binaries [J ] . Computer Science , 2019 , 46 ( S2 ): 417 - 420 , 432 .
CHENG Y , ZHOU Z , MIAO Y , et al . ROPecker:a generic and practical approach for defending against ROP attack [C ] // Network and Distributed System Security Symposium .[S.n.:s.l. ] , 2014 : 1 - 14 .
FENG L , HUANG J , HU J , et al . FastCFI:real-time control flow integrity using FPGA without code instrumentation [C ] // International Conference on Runtime Verification . Berlin:Springer , 2019 : 221 - 238 .
KAWADA T , HONDA S , MATSUBARA Y , et al . TZmCFI:RTOS-aware control-flow integrity using trustzone for Armv8-M [J ] . International Journal of Parallel Programming , 2019 ,doi:10.1007/s10766-020-00673-z.
0
浏览量
979
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构