首页 | 官方网站   微博 | 高级检索  
     

一种操作系统函数级安全监控方案
引用本文:孙书彤,王祥武,蔡立志.一种操作系统函数级安全监控方案[J].计算机应用与软件,2021,38(1):330-333.
作者姓名:孙书彤  王祥武  蔡立志
作者单位:中国银联股份有限公司 上海 201201;中国海洋石油集团有限公司 北京 100010;上海计算机软件技术开发中心上海市计算机软件评测重点实验室 上海 201112
摘    要:当前我国自主研发的操作系统已经具备许多实际应用环境和场景,尤其多用于重要服务器、核心设备等关键环节,因此挖掘并修复它们的内核漏洞十分重要。目前业界的漏洞挖掘技术基本上还是局部的、人工的和技术性的手段,缺乏一种广义的、全局的、算法级别上的思想和方法。在已知源码的基础上,提出一种以函数为粒度的自动变造、自动追踪和自动分析验证算法。实现了操作系统内核函数运行时监控和调用序列分析,实时发现利用内核漏洞的入侵,并精确定位出现漏洞的源码,阻塞漏洞入侵代码的运行。

关 键 词:控制转移型漏洞  非控制转移型漏洞  函数级调用序列图库  脱序调用  脱序拐点函数

AN OPERATING SYSTEM FUNCTION LEVEL SECURITY MONITORING SCHEME
Sun Shutong,Wang Xiangwu,Cai Lizhi.AN OPERATING SYSTEM FUNCTION LEVEL SECURITY MONITORING SCHEME[J].Computer Applications and Software,2021,38(1):330-333.
Authors:Sun Shutong  Wang Xiangwu  Cai Lizhi
Affiliation:(China UnionPay Co.,Ltd.,Shanghai 201201,China;China National Offshore Oil Corporation,Beijing 100010,China;Shanghai Key Laboratory of Computer Software Testing&Evaluating,Shanghai Development Center of Computer Software Technology,Shanghai 201112,China)
Abstract:The operating system of independent research and development in China has many practical application environments and scenarios,especially for important servers,core equipment and other key links,so it is very important to mine and repair their kernel vulnerabilities.At present,the vulnerability mining technology in the industry is basically a local,artificial and technical means,lacking a generalized,global and algorithm level idea and method.This paper presents an algorithm with granularity of function of automatic alteration,automatic tracing and automatic analysis and verification based on known source code.It realizes the runtime monitoring and call sequence analysis of the kernel functions of the operating system.It can detect the intrusion of kernel vulnerabilities in real time,locate the source code of the vulnerability accurately,and block the operation of the vulnerability intrusion code.
Keywords:Control transfer vulnerability  Uncontrolled transfer vulnerability  Function level call sequence library  Out-of-order call  Out-of-order inflection point function
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号