Powered by OpenAIRE graph
Found an issue? Give us feedback
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Защита от эксплуатации Ð±Ð¸Ð½Ð°Ñ€Ð½Ñ‹Ñ ÑƒÑÐ·Ð²Ð¸Ð¼Ð¾ÑÑ‚ÐµÐ¹ на основе самомодифицирующегося кода

выпускная квалификационная работа бакалавра

Защита от эксплуатации Ð±Ð¸Ð½Ð°Ñ€Ð½Ñ‹Ñ ÑƒÑÐ·Ð²Ð¸Ð¼Ð¾ÑÑ‚ÐµÐ¹ на основе самомодифицирующегося кода

Abstract

Целью работы является защита бинарных исполняемых файлов в ОС Windows с использованием самомодифицирующегося кода. Предметом исследования являются современные методы защиты от эксплуатации бинарных исполняемых файлов в ОС Windows. Задачи, решаемые в ходе исследования: 1. Проведение анализа бинарных уязвимостей ПО и способов их эксплуатации в ОС Windows. 2. Исследование существующих подходов к защите от эксплуатации бинарных уязвимостей и способов их обхода. 3. Разработка метода защиты от попыток эксплуатации уязвимостей на основе самомодифицирующегося кода. 4. Реализация прототипа программного средства, реализующего предложенный метод и оценка его эффективности. В ходе работы были исследованы архитектура и реализация защитных механизмов защиты от бинарной эксплуатации в ОС Windows. Были проанализированы современные исследования в области обеспечения безопасности бинарных исполняемых файлов в ОС Windows. В результате работы было разработано средство защиты программных дефектов в бинарных исполняемых файлах ОС Windows на основе самомодифицирующегося кода, была продемонстрирована эффективность средства. Полученные результаты могут быть использованы в качестве основы для проектирования средств защиты бинарных исполняемых файлов на основе самомодифицирующегося кода.

The purpose of the study is to protect binary executable files in Windows OS based on the self-modified code. The subject of the research is modern methods of protecting against exploitation of binary files and executable files in Windows OS. Problems solved during the study: 1. Conducting an analysis of binary software vulnerabilities and the method of their exploitation in Windows OS. 2. Research of existing approaches to protection against exploitation of binary vulnerabilities and ways to bypass them. 3. Development of a method of protection against defects based on self-modified code. 4. Implementation of a prototype software tool that implements the proposed method and evaluation of its effectiveness. During the work, the architecture was studied, and protective measures were implemented against binary exploitation in Windows OS. Modern research in the field of ensuring the security of binary files and executable files in Windows OS is analyzed. As a result of the work, a tool was developed to protect software defects in binary executable files of the Windows OS based on the self-modified code, and the effectiveness of the tool was demonstrated. The results obtained can be used as a basis for designing means for protecting binary executable files based on self-modified code.

Keywords

self-modifying code, exploitation protection, binary executable files, бинарные исполняемые файлы, переполнение буфера, самомодифицирующийся код, защита от эксплуатации, buffer overflow

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!