首页 | 本学科首页   官方微博 | 高级检索  
     

面向进程控制流劫持攻击的拟态防御方法
引用本文:潘传幸,张铮,马博林,姚远,季新生.面向进程控制流劫持攻击的拟态防御方法[J].通信学报,2021(1):37-47.
作者姓名:潘传幸  张铮  马博林  姚远  季新生
作者单位:数学工程与先进计算国家重点实验室;国家数字交换系统工程技术研究中心
基金项目:国家自然科学基金资助项目(No.61521003);国家重点研发计划基金资助项目(No.2018YFB0804003)。
摘    要:为了防御进程控制流劫持攻击,从漏洞利用的角度对攻击过程建立了威胁模型,提出了截断关键漏洞利用环节的“要塞”防御。在研究拟态防御原理的基础上提出了进程的拟态执行模型,并对该模型进行了分析与有效性证明,拟态执行能够有效截断控制流劫持的攻击实施过程;实现了拟态执行的原型系统MimicBox,并对MimicBox进行了有效性验证实验、性能测试和对比评估。有效性验证实验表明,MimicBox可以有效防御绝大部分基于已知类型二进制漏洞的控制流劫持攻击;性能评估结果表明,MimicBox对CPU密集型程序带来的额外性能开销不会超过13%;对比评估结果表明,拟态执行相对于控制流完整性防御来说,是一种较有效实用的主动防御方案。

关 键 词:控制流劫持  拟态防御  拟态执行  原型系统  评估测试

Method against process control-flow hijacking based on mimic defense
PAN Chuanxing,ZHANG Zheng,MA Bolin,YAO Yuan,JI Xinsheng.Method against process control-flow hijacking based on mimic defense[J].Journal on Communications,2021(1):37-47.
Authors:PAN Chuanxing  ZHANG Zheng  MA Bolin  YAO Yuan  JI Xinsheng
Affiliation:(State Key Laboratory of Mathmatical Engineering and Advanced Computing,Zhengzhou 450001,China;National Digital Switching System Engineering&Technological Research Center,Zhengzhou 450002,China)
Abstract:To defeat the attack of process control flow hijacking,a threat model was established from the point of vulnerability utilization,and the fortress defense to cut off the key vulnerability utilization path was proposed.On the basis of studying the principle of mimic defense,a threat model of process mimic execution was proposed,and the threat model was analyzed and proved to be effective.Mimic execution could effectively cut off the attack path of control flow hijacking.The ptototype of mimic execution,MimicBox,was implemented.The validation experiment shows that MimicBox can effectively defend against most control flow hijacking attacks based on known binary vulnerabilities.The performance evaluation result shows that the overhead MimicBox lead to is less than 13%on CPU-intensive programs.The Comparative evaluation result shows that mimic execution is a more effective and practical active defense method compared with control flow integrity.
Keywords:control-flow hijacking  mimic defense  mimic execution  prototype  evaluation
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号