CN106991328A - A kind of vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis - Google Patents

A kind of vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis Download PDF

Info

Publication number
CN106991328A
CN106991328A CN201710202771.2A CN201710202771A CN106991328A CN 106991328 A CN106991328 A CN 106991328A CN 201710202771 A CN201710202771 A CN 201710202771A CN 106991328 A CN106991328 A CN 106991328A
Authority
CN
China
Prior art keywords
heap
vulnerability exploit
fingerprint
dram
method based
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710202771.2A
Other languages
Chinese (zh)
Other versions
CN106991328B (en
Inventor
何永强
朱鲲鹏
吕承琨
卞玉捷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xinghua Eternity (beijing) Science And Technology Co Ltd
Original Assignee
Xinghua Eternity (beijing) Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xinghua Eternity (beijing) Science And Technology Co Ltd filed Critical Xinghua Eternity (beijing) Science And Technology Co Ltd
Priority to CN201710202771.2A priority Critical patent/CN106991328B/en
Publication of CN106991328A publication Critical patent/CN106991328A/en
Application granted granted Critical
Publication of CN106991328B publication Critical patent/CN106991328B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

A kind of vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis, step is as follows:1st, dynamic link library file is injected into target process;2nd, vectorization abnormality processing function is applied for;3rd, turn-on data performs protection;4th, the memory block of random size inaccessible is distributed;5th, application EMS memory occupation HeapSpray addresses;6th, the heap block distribution situation of monitoring process heap;7th, the module to loading carries out gravity treatment plot;8th, applied address is the memory block of 0x1 inaccessible attribute;9th, final anomalous event is taken over;10th, special interface function is kidnapped, Activity recognition is carried out to transfer environment;11st, thread scheduling process, the change behavior of the access token and SecurityDescriptor pointers of monitoring objective process are kidnapped;12nd, the access implementation status under kernel state to user's layer address is monitored;By above step, the effect of detection leak attack has been reached, flow complexity, the problem of there is lag period, poor compatibility in existing guard technology is solved.

Description

A kind of vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis
One, technical fields
The present invention provides a kind of vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis, and it is related to leakage Hole utilizes detection recognition method, belongs to technical field of network security.
Two, background technologies
Leak refers to the weakness or defect that a system is present, and system is to specific threat attack or the sensitivity of hazard event Property, or the possibility that the threat attacked is acted on.Defect when leak may be from application software or operating system design or The mistake produced during coding, it is also possible to unreasonable in design defect of the business in iterative process or logic flow Part.These defects, mistake or unreasonable part may be utilized either intentionally or unintentionally, so as to the assets or fortune of a tissue Row is adversely affected, and such as information system is attacked or controlled, and capsule information are stolen, and user data is tampered, and system is made To invade the springboard of other host computer systems.Be directed to government in recent years, military project, education department, R&D institution and enterprise it is senior Continuation threatens (APT-Advanced Persistent Threat) event duration to rise, and vulnerability exploit is therein main Attack meanses.
In face of increasingly enhanced vulnerability exploit skill, existing protection method has following several types, and all exists obvious Shortcoming:
1. by the patch installing of leak program or timely ROMPaq to latest edition.This method can for known leak To play preferable protection, but the software version quantities for updating an overall situation is big, and cycles consumed is long, and flow is complicated, and It cannot be guaranteed that redaction does not have leak, if attacker has found leak earlier, it can be attacked before patch issue using the leak Hit.
2. pass through static nature scanning recognition leak.This method needs to combine manual analysis, has higher to technical staff Technical requirements, and there is the lag period of certain time, that is, sample is captured to addition rule this period after analysis, leak profit In larger destruction may have been had resulted in, it is impossible to carry out the detection and protection of unknown leak.
3. rely on the security mechanism that operating system is provided in itself.Operating system can be provided in itself to be directed to the protection of leak and arranges Apply, but the operating system that these safeguard procedures can not be under its compatible version and part needs the branch of translation and compiling environment or hardware Hold, protection area coverage is small, poor compatibility, it is larger that integrated environment does system upgrade cost, expend the time long.
The three, content of the invention
1. goal of the invention
In view of the above problems, detect and know the invention provides a kind of vulnerability exploit based on Dram fingerprint anomaly analysis Other method, it is therefore intended that defence identification that can be accurately and timely includes known bugs and the utilization means of unknown leak, and solves Above-mentioned obvious defect problem, so that emergency response is quickly carried out, the safety of environmental protection system.
2. technical scheme
A kind of vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis of the present invention, its step is as follows:
Step 1:The dynamic link library file that the present invention is developed is injected into target process;
Step 2:Apply for a vectorization abnormality processing function (VEH-Vector Exception in target process Handler) adapter exception procedure;
Step 3:Turn-on data performs protection (DEP-Data Execution Prevention);
Step 4:By the memory block of the random size of distribution of the low to high order in address, internal memory protection attribute is set to visit Ask;
Step 5:Apply for common heap injection (heap-spray) address of EMS memory occupation;
Step 6:Create the heap block distribution situation of thread monitor process heap;
Step 7:Kidnap the interface function (API- being called in dynamic link library loading flow in NTDLL modules Application Programming Interface), gravity treatment plot operation is carried out to the particular module of dynamic load;
Step 8:Applied address is 0x1 memory block, and internal memory protection attribute is set to inaccessible;
Step 9:Apply for final abnormal function, take over final anomalous event;
Step 10:The high interface function of all utilization rates in vulnerability exploit is kidnapped, exception is done according to process to transfer environment Detect and to the Activity recognition of the being associated property of module in vulnerability exploit module blacklist;
Step 11:Thread scheduling process is kidnapped, the access token and SecurityDescriptor of monitoring objective process refer to The change behavior of pin;
Step 12:Monitor under kernel state (ring0), to the access implementation status of user's layer address;
Wherein, " target process " described in step 1, it refers to the process protected by the present invention.
Wherein, " dynamic link library file " described in step 1, it refers to a kind of not executable binary program text Part, it allows code and other resources necessary to procedure sharing execution special duty.
Wherein, " a vectorization abnormality processing function (VEH-Vector is applied in target process described in step 2 Exception Handler) adapter exception procedure ", its way is as follows:Distributing operation system interface function AddVectoredExceptionHandler, registers a processing function, for the abnormal interrupt occurred in treatment progress.
Wherein, " turn-on data performs protection " described in step 3, its way is as follows:Obtain in kernel32 modules The address of GetSystemDEPPolicy, GetProcessDEPPolicy, SetProcessDEPPolicy interface function, passes through The DEP configuration information of the first two interface function detecting system and current process, passes through the 3rd function turn-on data Protection is performed, is not executable state by stack space and heap space internal memory protection setting.
Wherein, " inaccessible " described in step 4, it refers to that internal memory protection attribute is PAGE_NOACCESS.
Wherein, " heap sprays (heap-spray) " described in step 5, it refers to a kind of vulnerability exploit technology, for promoting Enter arbitrary code execution, certain section of byte sequence in heap is placed into the precalculated position of target process.
Wherein, " common heap injection (heap-spray) address of application EMS memory occupation " described in step 5, its way is such as Under:Heap-spray addresses common at present are distributed in advance, and such as 0x0a0a0a0a, 0x0c0c0c0c0c, application method are abilities The common technique in domain.
Wherein, " the heap block distribution situation for creating thread monitor process heap " described in step 6, its way is as follows:Create Heap block in one worker thread, searching loop current process heap, detects the quantity of formed objects heap block, judges heap number of blocks simultaneously And whether single size exceedes critical value.
Wherein, " particular module " described in step 7, it refers to be not turned on/DYNAMICBASE and with relocation table Module.
Wherein, " the interface letter being called in dynamic link library loading flow in NTDLL modules is kidnapped described in step 7 Number (API-Application Programming Interface), gravity treatment plot behaviour is carried out to the particular module of dynamic load Make ", its way is as follows:NTDLL export function NtMapViewOfSection is changed, in dynamic link library file dynamic load When, judge the relocation information of this document, discharge original map section internal memory and apply for a part of EMS memory occupation address, again The original memory field of application mapping.
Wherein, " the final abnormal function of application, take over final anomalous event " described in step 9, its way is as follows:Call Operating system interface function, registers a final abnormality processing function, and the process for occurring in treatment progress is collapsed abnormal.
Wherein, " kidnapping the high interface function of all utilization rates in vulnerability exploit " described in step 10, its way is as follows: Common interface function during hook (HOOK) vulnerability exploit, such as LoadLibraryExW, LoadLibraryExA, VirtualAllocEx,VirtualProtectEx,Virtual Protect,VirtualAlloc,WinExec, CreateFileA etc..
Wherein, " doing abnormality detection according to process to transfer environment " described in step 10, its way is as follows:Detection stack refers to Whether pin register is located in the initial range of the stack address preserved in current thread block of information, detects the complete of abnormality processing chain Whether integer, detection caller is Call instructions, and whether detection specifies the stack backtracking chain environment of hierachy number abnormal.
Wherein, " Activity recognition " described in step 10, it refers to after black list module is loaded with, the abnormal row sent For detection, i.e. behavior outside white list behavior, for detecting non-internal memory damage type vulnerability exploit means.
Wherein, " the behavior knowledge to the being associated property of module in vulnerability exploit module blacklist described in step 10 Not ", its way is as follows:When in leak the module loading of blacklist occurs for monitoring, this pattern is opened, in detection procedure Abnormal behaviour, such as IEXPLORE create Powershell processes.
Wherein, " access token " described in step 11, it refers to, each active program has one to access order Board (access token), it, which is one group, describes the data message of authority.
Wherein, described in step 11 " kidnap thread scheduling process, the access token of monitoring objective process and The change behavior of SecurityDescriptor pointers ", its way is as follows:Collect in current system environment and possess system power The process ID of limit process, when thread scheduling CR3 registers switch, whether detection current process is located at the process ID collected In, while detecting the behavior that SecurityDescriptor pointers are set to 0.
By above step, the present invention realizes the vulnerability exploit detection identification side based on Dram fingerprint anomaly analysis Method, with reference to the safeguard procedures of system, has reached the effect of detection identification leak attack, has solved flow in existing guard technology Complexity, the problem of there is lag period, poor compatibility.
3. advantage
By above-mentioned technical proposal, the present invention, with reference to the safeguard procedures of system, is independently realized a set of by dynamic mode Based on the vulnerability exploit detection recognition method of Dram fingerprint anomaly analysis, system supporting rate and software compatibility are high, cost Low, vulnerability exploit area coverage is wide, can effectively and timely detect in identification vulnerability exploit (exploit) (including unknown leak) Most of technological means.
Four, are illustrated
Fig. 1 is the method for the invention schematic flow sheet.
Abnormality detection schematic flow sheet when Fig. 2 is the inventive method docking port function call.
Fig. 3 is the inventive method abnormality processing schematic flow sheet.
Five, embodiments
The shortcoming in vulnerability exploit detection scheme in order to solve prior art offer, i.e., can not detect that UNKNOWN TYPE leaks Hole, the problems such as poor compatibility area coverage is small, present approach provides a kind of detection identifying schemes of vulnerability exploit, by inciting somebody to action Protection module is injected into target process, arrangement internal memory to the perfect condition defendd, and the behavior of monitoring objective process is gone forward side by side Mobile state Analysis, to recognize the attack meanses of vulnerability exploit, be not limited to known bugs utilization, play protection process and system environments Effect.
In order that the purpose of the inventive method, technical scheme more clearly, is carried out further detailed below in conjunction with accompanying drawing Describe in detail bright.
It is the vulnerability exploit detection identification process schematic diagram of the inventive method referring to Fig. 1, the present invention is a kind of based in dynamic The vulnerability exploit detection recognition method of fingerprint anomaly analysis is deposited, its idiographic flow step is as follows:
Step S101:It is that the protection module developed by technical staff is injected into mesh to be protected by vulnerability exploit detection module In mark process.
Step S102:Apply for the abnormal interrupt information in vectorization abnormality processing function, adapter process in target process, See that Fig. 3 steps are as follows, include step S301- steps S305:
Step S301:Abnormal interrupt occurs inside target process, is taken over by the vectorization abnormality processing of protection module.
Step S302:Filter out the abnormal interrupt that non-abnormal access is sent.
Step S303:Judging this abnormal interrupt behavior is disposed with by internal memory of the protection module conducted in initialization It is relevant.
Step S304:If not related, terminate this exception handling procedure.
Step S305:Step 304 performs failure, gives a warning, and detects the attack meanses of vulnerability exploit.
Step S103:The DEP configuration information of detecting system, in the state of supporting not open, passes through Interface function SetProcessDEPPolicy is configured opening derived from kelner32 modules, by heap, stack address space internal memory Attribute is protected to be set to not executable state.
Step S104:Order application random amount from low address to high address, the memory block of random size, and by repairing Change the PAGE TABLE ENTRY (PTE) of related pages, add special identifier position, set its internal memory to protect attribute to be inaccessible State.
Step S105:Apply for the popular addresses such as conventional heap injection overlay address, i.e. 0x0C0C0C0C in target process, And by changing the PAGE TABLE ENTRY (PTE) of related pages, special identifier position is added, set its internal memory to protect the attribute to be Inaccessible state.
Step S106:A worker thread is created, for the memory block distribution condition of detection procedure heap environment, to certain big The heap environment that same big rickle number of blocks on small exceedes critical value sends vulnerability exploit warning.
Step S107:The interface function during dynamic module loading is kidnapped ,/DYNAMICBASE states are being not turned on And when possessing the dynamic linked library modular loading of relocation table, by force in former load address application EMS memory occupation position, force The dynamic linked library modular is loaded into other positions.
Step S108:One section internal memory of the applied address since 0x1, by the PAGE TABLE for changing related pages ENTRY (PTE), adds special identifier position, sets its internal memory to protect attribute to be inaccessible state.
Step S109:Final abnormality processing function is set in current process space, final anomalous event is taken over.
Step S110:Kidnap in vulnerability exploit, the interface function being frequently used, abnormality detection is carried out to its flow, seen Fig. 2 steps are as follows, include step S201- steps S208:
Step S201:Parameter to this function call process carries out abnormality detection, such as VirtualProtect interfaces letter Whether several lpAddress parameters are located at stack address space and whether flNewProtect parameters are with executable flag, Such as abnormal parameters, step S208 is gone to.
Step S202:Check whether the stack pointer register in current environment is located within stack address space, be such as not belonging to The scope, sends exception, goes to step S208.
Step S203:Detect in current environment, call the abnormality processing chain for being whether complete in this interface function, such as deposit In exception, step S208 is gone to.
Step S204:Whether the caller for detecting the interface function is " Call " instruction, if it is not, exception is sent, and Go to step S208.
Step S205:Enter the chain environment analysis of broker's storehouse backtracking to this function call, detect whether the link is normal, ground Location environment whether there is in white list, if any exception, go to step S208.
Step S206:When often occurring the module blacklist loading of leak, this pattern is opened, in detection procedure Abnormal behaviour, such as IEXPLORE create Powershell processes.
Step S207:Such as step S206 detects without exception, then this detection terminates, and waits calling for next interface function.
Step S208:Give a warning, detect the attack meanses of vulnerability exploit.
Step S111:The thread scheduling of current system is kidnapped, its event is detected whether application program visits when occurring Ask the detection that SecurityDescriptor pointers are 0 in the situation that token changes, addition object header structure body.
Step S112:Access and implementation status of the code to client layer internal memory under kernel state are monitored, the event is sent out when occurring Go out warning, detect vulnerability exploit attack meanses.

Claims (10)

1. a kind of vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis, it is characterised in that:Its step is such as Under:
Step 1:The dynamic link library file of exploitation is injected into target process;
Step 2:Apply for that a vectorization abnormality processing function is VEH-Vector Exception in target process Handler adapter exception procedures;
Step 3:It is DEP-Data Execution Prevention that turn-on data, which performs protection,;
Step 4:By the memory block of the random size of distribution of the low to high order in address, internal memory protection attribute is set to inaccessible;
Step 5:Apply for that the common heap injection of EMS memory occupation is heap-spray addresses;
Step 6:Create the heap block distribution situation of thread monitor process heap;
Step 7:It is API- to kidnap the interface function being called in dynamic link library loading flow in NTDLL modules Application Programming Interface, gravity treatment plot operation is carried out to the particular module of dynamic load;
Step 8:Applied address is 0x1 memory block, and internal memory protection attribute is set to inaccessible;
Step 9:Apply for final abnormal function, take over final anomalous event;
Step 10:The high interface function of all utilization rates in vulnerability exploit is kidnapped, abnormality detection is done according to process to transfer environment And to the Activity recognition of the being associated property of module in vulnerability exploit module blacklist;
Step 11:Kidnap thread scheduling process, the access token of monitoring objective process and SecurityDescriptor pointers Change behavior;
Step 12:Under monitoring kernel state is ring0, to the access implementation status of user's layer address;
By above step, the vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis is realized, with reference to being The safeguard procedures of system, have reached the effect of detection identification leak attack, have solved flow complexity in existing guard technology, exist The problem of lag period, poor compatibility.
2. a kind of vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis according to claim 1, It is characterized in that:
In step 1 described " target process ", the process protected by the present invention is referred to;Described " dynamic link library text Part ", refers to a kind of not executable binary program file, it allow procedure sharing perform special duty necessary to code and Other resources.
3. a kind of vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis according to claim 1, It is characterized in that:
It is described in step 2 " to apply for that a vectorization abnormality processing function is VEH-Vector in target process Exception Handler adapters exception procedure ", its way is as follows:Distributing operation system interface function AddVectoredExceptionHandler, registers a processing function, for the abnormal interrupt occurred in treatment progress.
4. a kind of vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis according to claim 1, It is characterized in that:
In step 3 described " turn-on data performs protection ", its way is as follows:Obtain in kernel32 modules The address of GetSystemDEPPolicy, GetProcessDEPPolicy, SetProcessDEPPolicy interface function, passes through The DEP configuration information of the first two interface function detecting system and current process, passes through the 3rd function turn-on data Protection is performed, is not executable state by stack space and heap space internal memory protection setting.
5. a kind of vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis according to claim 1, It is characterized in that:
It is described in steps of 5 that " heap injection is heap-spray ", and it refers to a kind of vulnerability exploit technology, for promoting any generation Code is performed, and certain section of byte sequence in heap is placed into the precalculated position of target process;
Described " the common heap injection of application EMS memory occupation is heap-spray addresses ", its way is as follows:Distribute in advance current Common heap-spray addresses, such as 0x0a0a0a0a, 0x0c0c0c0c0c, application method are the common techniques of this area.
6. a kind of vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis according to claim 1, It is characterized in that:
In step 6 described " the heap block distribution situation for creating thread monitor process heap ", its way is as follows:Create a job Heap block in thread, searching loop current process heap, detects the quantity of formed objects heap block, judges heap number of blocks and single big It is small whether to exceed critical value.
7. a kind of vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis according to claim 1, It is characterized in that:
In step 7 described " particular module ", it refers to be not turned on/DYNAMICBASE and the module with relocation table;
It is described that " it is API- to kidnap the interface function being called in dynamic link library loading flow in NTDLL modules Application Programming Interface, the operation of gravity treatment plot is carried out to the particular module of dynamic load ", it does Method is as follows:NTDLL export function NtMapViewOfSection is changed, in dynamic link library file dynamic load, is judged The relocation information of this document, discharges original map section internal memory and applies for a part of EMS memory occupation address, and application again is reflected Penetrate original memory field.
8. a kind of vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis according to claim 1, It is characterized in that:
In step 9 described " the final abnormal function of application, take over final anomalous event ", its way is as follows:Call operation system System interface function, registers a final abnormality processing function, and the process for occurring in treatment progress is collapsed abnormal.
9. a kind of vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis according to claim 1, It is characterized in that:
In step 10 described " kidnapping the high interface function of all utilization rates in vulnerability exploit ", its way is as follows:Hook (HOOK) the common interface function during vulnerability exploit, such as
LoadLibraryExW,LoadLibraryExA,VirtualAllocEx,VirtualProtectEx,VirtualProt ect,VirtualAlloc,WinExec,CreateFileA;
In step 10 described " doing abnormality detection according to process to transfer environment ", its way is as follows:Detect stack pointer deposit Whether device is located in the initial range of the stack address preserved in current thread block of information, detects the complete type of abnormality processing chain, Whether detection caller is Call instructions, and whether detection specifies the stack backtracking chain environment of hierachy number abnormal;
In step 10 described " Activity recognition ", it refers to after black list module is loaded with, the unusual checking sent, Behavior i.e. outside white list behavior, for detecting non-internal memory damage type vulnerability exploit means;
In step 10 described " to the Activity recognition of the being associated property of module in vulnerability exploit module blacklist ", it does Method is as follows:When in leak the module loading of blacklist occurs for monitoring, this pattern is opened, for the abnormal row in detection procedure For such as IEXPLORE creates Powershell processes.
10. a kind of vulnerability exploit detection recognition method based on Dram fingerprint anomaly analysis according to claim 1, It is characterized in that:
In a step 11 described " access token ", it refers to, each active program has an access token i.e. Access token, it, which is one group, describes the data message of authority;
It is described in a step 11 " kidnap thread scheduling process, the access token of monitoring objective process and The change behavior of SecurityDescriptor pointers ", its way is as follows:Collect in current system environment and possess system power The process ID of limit process, when thread scheduling CR3 registers switch, whether detection current process is located at the process ID collected In, while detecting the behavior that SecurityDescriptor pointers are set to 0.
CN201710202771.2A 2017-03-30 2017-03-30 A kind of vulnerability exploit detection recognition method based on dynamic memory fingerprint anomaly analysis Active CN106991328B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710202771.2A CN106991328B (en) 2017-03-30 2017-03-30 A kind of vulnerability exploit detection recognition method based on dynamic memory fingerprint anomaly analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710202771.2A CN106991328B (en) 2017-03-30 2017-03-30 A kind of vulnerability exploit detection recognition method based on dynamic memory fingerprint anomaly analysis

Publications (2)

Publication Number Publication Date
CN106991328A true CN106991328A (en) 2017-07-28
CN106991328B CN106991328B (en) 2019-11-29

Family

ID=59411896

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710202771.2A Active CN106991328B (en) 2017-03-30 2017-03-30 A kind of vulnerability exploit detection recognition method based on dynamic memory fingerprint anomaly analysis

Country Status (1)

Country Link
CN (1) CN106991328B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107291480A (en) * 2017-08-15 2017-10-24 中国农业银行股份有限公司 A kind of function calling method and device
CN108133149A (en) * 2018-01-11 2018-06-08 武汉斗鱼网络科技有限公司 A kind of data guard method, device and electronic equipment
CN108959938A (en) * 2018-07-05 2018-12-07 腾讯科技(深圳)有限公司 Detect method, apparatus, storage medium and the equipment of vulnerability exploit
CN112134875A (en) * 2020-09-18 2020-12-25 国网山东省电力公司青岛供电公司 IoT network abnormal flow detection method and system
CN112307482A (en) * 2019-07-29 2021-02-02 北京奇虎科技有限公司 Intrusion kernel detection method and device based on target range and computing equipment
US11169869B1 (en) 2020-07-08 2021-11-09 International Business Machines Corporation System kernel error identification and reporting
WO2024112272A1 (en) 2022-11-24 2024-05-30 Telefonaktiebolaget Lm Ericsson (Publ) Using memory page offsets to detect cybersecurity attacks

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902481A (en) * 2010-08-10 2010-12-01 厦门市美亚柏科信息股份有限公司 Real-time monitoring method and device for webpage Trojan horse
CN102622543A (en) * 2012-02-06 2012-08-01 北京百度网讯科技有限公司 Method and device for dynamically detecting malicious webpage scripts
CN103632093A (en) * 2013-09-17 2014-03-12 中国人民解放军61599部队计算所 Trojan detection method
CN103714292A (en) * 2014-01-15 2014-04-09 四川师范大学 Method for detecting exploit codes
CN103886252A (en) * 2013-04-26 2014-06-25 卡巴斯基实验室封闭式股份公司 Software Code Malicious Selection Evaluation Executed In Trusted Process Address Space
CN104217163A (en) * 2014-09-10 2014-12-17 珠海市君天电子科技有限公司 Method and device for detecting structured exception handling (SEH) attacks
US9336386B1 (en) * 2013-06-12 2016-05-10 Palo Alto Networks, Inc. Exploit detection based on heap spray detection

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902481A (en) * 2010-08-10 2010-12-01 厦门市美亚柏科信息股份有限公司 Real-time monitoring method and device for webpage Trojan horse
CN102622543A (en) * 2012-02-06 2012-08-01 北京百度网讯科技有限公司 Method and device for dynamically detecting malicious webpage scripts
CN103886252A (en) * 2013-04-26 2014-06-25 卡巴斯基实验室封闭式股份公司 Software Code Malicious Selection Evaluation Executed In Trusted Process Address Space
US9336386B1 (en) * 2013-06-12 2016-05-10 Palo Alto Networks, Inc. Exploit detection based on heap spray detection
CN103632093A (en) * 2013-09-17 2014-03-12 中国人民解放军61599部队计算所 Trojan detection method
CN103714292A (en) * 2014-01-15 2014-04-09 四川师范大学 Method for detecting exploit codes
CN104217163A (en) * 2014-09-10 2014-12-17 珠海市君天电子科技有限公司 Method and device for detecting structured exception handling (SEH) attacks

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨明 等: "高混淆网页木马的研究与检测实现", 《计算机工程与设计》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107291480A (en) * 2017-08-15 2017-10-24 中国农业银行股份有限公司 A kind of function calling method and device
CN107291480B (en) * 2017-08-15 2020-12-15 中国农业银行股份有限公司 Function calling method and device
CN108133149A (en) * 2018-01-11 2018-06-08 武汉斗鱼网络科技有限公司 A kind of data guard method, device and electronic equipment
CN108959938A (en) * 2018-07-05 2018-12-07 腾讯科技(深圳)有限公司 Detect method, apparatus, storage medium and the equipment of vulnerability exploit
CN112307482A (en) * 2019-07-29 2021-02-02 北京奇虎科技有限公司 Intrusion kernel detection method and device based on target range and computing equipment
US11169869B1 (en) 2020-07-08 2021-11-09 International Business Machines Corporation System kernel error identification and reporting
CN112134875A (en) * 2020-09-18 2020-12-25 国网山东省电力公司青岛供电公司 IoT network abnormal flow detection method and system
CN112134875B (en) * 2020-09-18 2022-04-05 国网山东省电力公司青岛供电公司 IoT network abnormal flow detection method and system
WO2024112272A1 (en) 2022-11-24 2024-05-30 Telefonaktiebolaget Lm Ericsson (Publ) Using memory page offsets to detect cybersecurity attacks

Also Published As

Publication number Publication date
CN106991328B (en) 2019-11-29

Similar Documents

Publication Publication Date Title
CN106991328B (en) A kind of vulnerability exploit detection recognition method based on dynamic memory fingerprint anomaly analysis
CN106991324B (en) Malicious code tracking and identifying method based on memory protection type monitoring
EP3326100B1 (en) Systems and methods for tracking malicious behavior across multiple software entities
CN104520867B (en) Method, system and computer-readable medium for the actively monitoring, memory protection and integrity verification of destination apparatus
CN104217157B (en) A kind of anti-Application way of leak and system
EP3654218B1 (en) Method for detecting malicious code and deferring countermeasures
CN104756129B (en) For the security mechanism switched between the different operating domain of data processor
CN109726560A (en) Terminal device system protection method and device
US20100064367A1 (en) Intrusion detection for computer programs
US8645923B1 (en) Enforcing expected control flow in program execution
Parameswaran et al. Embedded systems security—an overview
CN103620613A (en) System and method for virtual machine monitor based anti-malware security
CN104881610B (en) A kind of defence method for virtual table hijack attack
CN113412483B (en) Computing device with increased resistance to address detection
US20070266435A1 (en) System and method for intrusion detection in a computer system
CN107346390A (en) A kind of malice sample testing method and device
Xu et al. BofAEG: Automated stack buffer overflow vulnerability detection and exploit generation based on symbolic execution and dynamic analysis
McGraw Building secure software: better than protecting bad software
Liu et al. Binary exploitation in industrial control systems: Past, present and future
US9881155B2 (en) System and method for automatic use-after-free exploit detection
Barbu et al. Application-replay attack on Java Cards: when the garbage collector gets confused
CN109271787A (en) A kind of operating system security active defense method and operating system
Moon et al. Architectural supports to protect OS kernels from code-injection attacks and their applications
US20160197955A1 (en) System and Method for Automatic Detection of Attempted Virtual Function Table or Virtual Function Table Pointer Overwrite Attack
Kong et al. PtmxGuard: An improved method for android kernel to prevent privilege escalation attack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant