
Целью работы ÑвлÑетÑÑ Ð·Ð°Ñ‰Ð¸Ñ‚Ð° бинарных иÑполнÑемых файлов в ОС Windows Ñ Ð¸Ñпользованием ÑамомодифицирующегоÑÑ ÐºÐ¾Ð´Ð°. Предметом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑŽÑ‚ÑÑ Ñовременные методы защиты от ÑкÑплуатации бинарных иÑполнÑемых файлов в ОС Windows. Задачи, решаемые в ходе иÑÑледованиÑ: 1. Проведение анализа бинарных уÑзвимоÑтей ПО и ÑпоÑобов их ÑкÑплуатации в ОС Windows. 2. ИÑÑледование ÑущеÑтвующих подходов к защите от ÑкÑплуатации бинарных уÑзвимоÑтей и ÑпоÑобов их обхода. 3. Разработка метода защиты от попыток ÑкÑплуатации уÑзвимоÑтей на оÑнове ÑамомодифицирующегоÑÑ ÐºÐ¾Ð´Ð°. 4. Ð ÐµÐ°Ð»Ð¸Ð·Ð°Ñ†Ð¸Ñ Ð¿Ñ€Ð¾Ñ‚Ð¾Ñ‚Ð¸Ð¿Ð° программного ÑредÑтва, реализующего предложенный метод и оценка его ÑффективноÑти. Ð’ ходе работы были иÑÑледованы архитектура и Ñ€ÐµÐ°Ð»Ð¸Ð·Ð°Ñ†Ð¸Ñ Ð·Ð°Ñ‰Ð¸Ñ‚Ð½Ñ‹Ñ… механизмов защиты от бинарной ÑкÑплуатации в ОС Windows. Были проанализированы Ñовременные иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð² облаÑти обеÑÐ¿ÐµÑ‡ÐµÐ½Ð¸Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑти бинарных иÑполнÑемых файлов в ОС Windows. Ð’ результате работы было разработано ÑредÑтво защиты программных дефектов в бинарных иÑполнÑемых файлах ОС Windows на оÑнове ÑамомодифицирующегоÑÑ ÐºÐ¾Ð´Ð°, была продемонÑтрирована ÑффективноÑть ÑредÑтва. Полученные результаты могут быть иÑпользованы в качеÑтве оÑновы Ð´Ð»Ñ Ð¿Ñ€Ð¾ÐµÐºÑ‚Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ ÑредÑтв защиты бинарных иÑполнÑемых файлов на оÑнове ÑамомодифицирующегоÑÑ ÐºÐ¾Ð´Ð°.
The purpose of the study is to protect binary executable files in Windows OS based on the self-modified code. The subject of the research is modern methods of protecting against exploitation of binary files and executable files in Windows OS. Problems solved during the study: 1. Conducting an analysis of binary software vulnerabilities and the method of their exploitation in Windows OS. 2. Research of existing approaches to protection against exploitation of binary vulnerabilities and ways to bypass them. 3. Development of a method of protection against defects based on self-modified code. 4. Implementation of a prototype software tool that implements the proposed method and evaluation of its effectiveness. During the work, the architecture was studied, and protective measures were implemented against binary exploitation in Windows OS. Modern research in the field of ensuring the security of binary files and executable files in Windows OS is analyzed. As a result of the work, a tool was developed to protect software defects in binary executable files of the Windows OS based on the self-modified code, and the effectiveness of the tool was demonstrated. The results obtained can be used as a basis for designing means for protecting binary executable files based on self-modified code.
self-modifying code, exploitation protection, binary executable files, бинаÑнÑе иÑполнÑемÑе ÑайлÑ, пеÑеполнение бÑÑеÑа, ÑамомодиÑиÑиÑÑÑÑийÑÑ ÐºÐ¾Ð´, заÑиÑа Ð¾Ñ ÑкÑплÑаÑаÑии, buffer overflow
self-modifying code, exploitation protection, binary executable files, бинаÑнÑе иÑполнÑемÑе ÑайлÑ, пеÑеполнение бÑÑеÑа, ÑамомодиÑиÑиÑÑÑÑийÑÑ ÐºÐ¾Ð´, заÑиÑа Ð¾Ñ ÑкÑплÑаÑаÑии, buffer overflow
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
