信息安全研究 ›› 2018, Vol. 4 ›› Issue (9): 806-818.

• 学术论文 • 上一篇    下一篇

Linux二进制漏洞利用——突破系统防御的关键技术

曾永瑞   

  1. 北京天融信科技有限公司
  • 收稿日期:2018-09-17 出版日期:2018-09-15 发布日期:2018-09-17
  • 通讯作者: 曾永瑞
  • 作者简介:曾永瑞 安全研究员, 主要研究领域为信息安全.

Linux Binary Exploit -The Key Technology of Breaking Through the System Defense

  • Received:2018-09-17 Online:2018-09-15 Published:2018-09-17

摘要: 随着开源软件在世界范围内与日俱增的影响力,Linux操作系统的市场份额保持着快速的增长率.Linux广泛应用于服务器、工控系统、嵌入式设备、云计算等领域,可以说其已成为我们生活中不可或缺的一部分.因此Linux系统的安全性研究具有极其重要的意义,而针对内存中漏洞的攻击和防御则是信息安全领域的研究热点.数十年来,虽然有各种二进制漏洞缓解机制不断提出,但漏洞攻击技术也不断发展,这也带来了诸多挑战.通过整理近年来二进制攻防领域的关键技术, 并回顾针对Linux二进制漏洞利用的传统方法以及相应的缓解机制.阐述了近几年来Linux二进制漏洞的利用方法以及其具体原理.最后, 对介绍的漏洞利用方法进行总结与梳理, 针对它们的特性提出相应的减缓措施, 并预测未来攻防博弈发展可能的趋势.

关键词: 漏洞, 利用, 攻防, 二进制, 安全

Abstract: With the increasing influence of open source software in the world, the market share of the Linux operating system has maintained a rapid growth rate and is widely used in many fields, such as servers, industrial control systems, embedded devices, cloud computing, etc. Therefore, the research on the security of Linux system is extremely important. The attack and defense against in-memory vulnerabilities is a research hotspot in the field of information security. Along with various binary vulnerability mitigation mechanisms have been proposed in decades, the exploit technology has also evolved. The challenges remain severe. This paper organized and summarizes the key technologies of Linux binary attack and defense in recent years. Firstly, it reviews the traditional utilization methods of Linux binary vulnerabilities and the corresponding mitigation mechanisms, also introduces the new utilization methods and their principles. Then, it combs and summarizes the methods of exploiting the vulnerability. Finally, it explores the future development trend of Linux binary attack and defense games, as well as some risks that may exist in widely used Linux systems, and part of security vulnerabilities that have been exposed.

Key words: vulnerability, exploit, offensive and defensive, binary, security