网络与信息安全学报 ›› 2023, Vol. 9 ›› Issue (3): 161-173.doi: 10.11959/j.issn.2096-109x.2023047

• 学术论文 • 上一篇    下一篇

基于gadget特征分析的软件多样性评估方法

谢根琳, 程国振, 王亚文, 王庆丰   

  1. 信息工程大学,河南 郑州 450001
  • 修回日期:2022-11-03 出版日期:2023-06-25 发布日期:2023-06-01
  • 作者简介:谢根琳(1999- ),男,河北辛集人,信息工程大学硕士生,主要研究方向为网络空间安全和软件多样化
    程国振(1986- ),男,山东菏泽人,信息工程大学副教授,主要研究方向为网络空间安全、云安全
    王亚文(1990- ),男,河南郑州人,信息工程大学助理研究员,主要研究方向为拟态防御和云计算
    王庆丰(1994- ),男,河南南阳人,信息工程大学助理研究员,主要研究方向为拟态防御和软件多样化
  • 基金资助:
    国家重点研发计划(2021YFB1006200);国家重点研发计划(2021YFB1006201);国家自然科学基金(62072467)

Software diversity evaluating method based on gadget feature analysis

Genlin XIE, Guozhen CHENG, Yawen WANG, Qingfeng WANG   

  1. Information Engineering University, Zhengzhou 450001, China
  • Revised:2022-11-03 Online:2023-06-25 Published:2023-06-01
  • Supported by:
    The National Key R&D Program of China(2021YFB1006200);The National Key R&D Program of China(2021YFB1006201);The National Natural Science Foundation of China(62072467)

摘要:

软件多样性能够有效提升系统弹性和安全性,广泛应用于软件分发、操作系统等场景,但现有软件多样性评估方法普遍基于常规代码特征进行度量且较为单一,难以准确反映软件多样性带来的安全增益。针对此问题,以ROP(return-oriented programming)攻击视角出发,通过分析软件多样性对代码重用攻击过程中各阶段的影响,提出了一种综合 gadget 质量、实用性和分布指标的软件多样性评估方法,通过度量软件多样性对构建gadget攻击链的难度、攻击者潜在可获得的计算能力和攻击者在不同变体中搜索gadget成本的影响程度对其进行安全性评估。利用不同粒度的多样化技术进行实验,结果表明,所提方法能够准确全面地反映软件多样性带来的安全增益,细粒度的多样化技术能使软件中大量的 gadget 重定位/修改/移除,增加攻击软件变体的成本,但部分多样化技术会导致不同程度的软件膨胀等问题。最后,依据不同度量指标下得到的结果对现有软件多样化技术的优势与不足进行分析和讨论。

关键词: 软件多样性, 代码重用攻击, gadget特征, 安全增益

Abstract:

Software diversity is commonly utilized in scenarios such as software distribution and operating systems to improves system resilience and security.However, existing software diversity evaluation methods are typically based on conventional code features and are relatively limited in scope, which can make it difficult to accurately reflect the security benefits of software diversity.To address this issue, a software diversity evaluation method was proposed from the perspective of ROP attack by analyzing the impact of software diversity on the difficulty of building a gadget attack chain, the attacker’s potentially available computing power, and the attacker’s cost of searching for gadgets in different variants.Metrics for the quality, practicability, and distribution of gadgets were integrated into this method.Testing was conducted using diversity technologies with different granularity.The evaluation results showed that the proposed method could accurately and comprehensively reflect the security gain brought by software diversity.It was observed that software diversity could relocate/modify/delete a large number of gadgets in the software, increasing the cost of attacking different software variants but also leading to different degrees of software expansion.Finally, an analysis and discussion of the advantages and disadvantages of existing diversity techniques were conducted based on the experimental results.

Key words: software diversity, code reuse attack, gadget feature, security gain

中图分类号: 

No Suggested Reading articles found!