CN102375957B - 内核级return-oriented rootkits的防御方法 - Google Patents
内核级return-oriented rootkits的防御方法 Download PDFInfo
- Publication number
- CN102375957B CN102375957B CN201110356081.5A CN201110356081A CN102375957B CN 102375957 B CN102375957 B CN 102375957B CN 201110356081 A CN201110356081 A CN 201110356081A CN 102375957 B CN102375957 B CN 102375957B
- Authority
- CN
- China
- Prior art keywords
- instruction
- index
- file
- return
- function pointer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Devices For Executing Special Programs (AREA)
Abstract
Description
Claims (5)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110356081.5A CN102375957B (zh) | 2011-11-10 | 2011-11-10 | 内核级return-oriented rootkits的防御方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110356081.5A CN102375957B (zh) | 2011-11-10 | 2011-11-10 | 内核级return-oriented rootkits的防御方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102375957A CN102375957A (zh) | 2012-03-14 |
CN102375957B true CN102375957B (zh) | 2014-05-14 |
Family
ID=45794548
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110356081.5A Expired - Fee Related CN102375957B (zh) | 2011-11-10 | 2011-11-10 | 内核级return-oriented rootkits的防御方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102375957B (zh) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103729601B (zh) * | 2012-10-11 | 2016-08-03 | 中天安泰(北京)信息技术有限公司 | 数据安全互联系统及数据安全互联系统建立方法 |
WO2015200510A1 (en) | 2014-06-24 | 2015-12-30 | Virsec Systems, Inc. | Automated code lockdown to reduce attach surface for software |
CN107341372B (zh) * | 2017-07-25 | 2018-12-07 | 北京深思数盾科技股份有限公司 | 一种软件保护方法和装置 |
CN108985063A (zh) * | 2018-07-13 | 2018-12-11 | 南方电网科学研究院有限责任公司 | 一种恶意代码混淆检测方法、系统、计算机设备、介质 |
CN111381879B (zh) * | 2018-12-31 | 2022-09-02 | 华为技术有限公司 | 一种数据处理方法及装置 |
CN109933358B (zh) * | 2019-01-28 | 2022-06-24 | 金卡智能集团股份有限公司 | 用于减少计量设备程序升级量的控制方法 |
CN110275792B (zh) * | 2019-03-05 | 2020-10-23 | 华为技术有限公司 | 高级语言的异常处理方法、装置和系统 |
CN109977671B (zh) * | 2019-03-14 | 2020-10-30 | 西安电子科技大学 | 一种基于编译器修改的Android锁屏型勒索软件检测方法 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102147843A (zh) * | 2011-05-16 | 2011-08-10 | 湖南大学 | 一种基于内核不变量保护的rootkit入侵检测和系统恢复方法 |
CN102194080A (zh) * | 2011-06-13 | 2011-09-21 | 西安交通大学 | 一种基于内核虚拟机的rootkit检测机制及检测方法 |
-
2011
- 2011-11-10 CN CN201110356081.5A patent/CN102375957B/zh not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102147843A (zh) * | 2011-05-16 | 2011-08-10 | 湖南大学 | 一种基于内核不变量保护的rootkit入侵检测和系统恢复方法 |
CN102194080A (zh) * | 2011-06-13 | 2011-09-21 | 西安交通大学 | 一种基于内核虚拟机的rootkit检测机制及检测方法 |
Non-Patent Citations (2)
Title |
---|
Defeating Return-Oriented Rootkits With "Return-less" Kernels;Jinku Li ect.;《proceedings of the 5th European conference on Computer systems》;20100416;195-208 * |
Jinku Li ect..Defeating Return-Oriented Rootkits With "Return-less" Kernels.《proceedings of the 5th European conference on Computer systems》.2010,195-208. |
Also Published As
Publication number | Publication date |
---|---|
CN102375957A (zh) | 2012-03-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102375957B (zh) | 内核级return-oriented rootkits的防御方法 | |
Liljestrand et al. | {PAC} it up: Towards pointer integrity using {ARM} pointer authentication | |
Hu et al. | Enforcing unique code target property for control-flow integrity | |
Davi et al. | Stitching the gadgets: On the ineffectiveness of {Coarse-Grained}{Control-Flow} integrity protection | |
Muntean et al. | cfi: Type-assisted control flow integrity for x86-64 binaries | |
CN101866406A (zh) | 一种栈溢出攻击防御方法 | |
Priyadarshan et al. | Practical fine-grained binary code randomization | |
Payer et al. | String oriented programming: When ASLR is not enough | |
US10528729B2 (en) | Methods and systems for defending against cyber-attacks | |
Moreira et al. | DROP THE ROP fine-grained control-flow integrity for the Linux kernel | |
Nyman et al. | Hardscope: Thwarting DOP with hardware-assisted run-time scope enforcement | |
US11947663B2 (en) | Control flow protection based on phantom addressing | |
Huang et al. | The taming of the stack: Isolating stack data from memory errors | |
CN107194246A (zh) | 一种用于实现动态指令集随机化的cpu | |
CN115510430A (zh) | 一种函数指针及其数据依赖的识别与保护方法、装置 | |
Grossklags et al. | τcfi: Type-assisted control flow integrity for x86-64 binaries | |
Momeu et al. | ISLAB: Immutable Memory Management Metadata for Commodity Operating System Kernels | |
Kilic et al. | Blind format string attacks | |
Fu et al. | Code reuse attack mitigation based on function randomization without symbol table | |
CN106127054A (zh) | 一种面向智能设备控制指令的系统级安全防护方法 | |
Dessouky et al. | CHASE: A configurable hardware-assisted security extension for real-time systems | |
Tanimoto et al. | Risk Assessment Quantification of Ambient Service | |
Olmos et al. | Protecting cryptographic code against Spectre-RSB (and, in fact, all known Spectre variants) | |
Davi et al. | Building control-flow integrity defenses | |
Ziad et al. | Using Name Confusion to Enhance Security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C53 | Correction of patent for invention or patent application | ||
CB03 | Change of inventor or designer information |
Inventor after: Li Jinku Inventor after: Ma Jianfeng Inventor after: Xie Kun Inventor after: Yang Chao Inventor after: Sun Cong Inventor before: Li Jinku Inventor before: Ma Jianfeng Inventor before: Xie Kun Inventor before: Yang Chao |
|
COR | Change of bibliographic data |
Free format text: CORRECT: INVENTOR; FROM: LI JINKU MA JIANFENG XIE KUN YANG CHAO TO: LI JINKU MA JIANFENG XIE KUN YANG CHAO SUN CONG |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20140514 Termination date: 20191110 |