Recently, major software vendors (such as Adobe and Microsoft) have focused on increasing the cost of attackers writing exploit code, rather than trying to reduce the number of vulnerabilities in their products. After realizing that perfect software is not possible, vendors are beginning to focus on mitigating attacks, and they strive to make attacker exploit code more time-consuming and less profitable. In the security features of the Windows 8 update, we see that Microsoft has made a major leap in this area. In the new version of the operating system that will be released in October, the enhanced memory protection will be able to withstand buffer overflow attacks, which mainly lead to privilege escalation attacks against applications or the kernel. Chris Valasek, senior security scientist and researcher at Coverity, and Tarjei Mandt, senior vulnerability researcher at Azimuth Security, studied early public releases of Windows 8 (from developer preview to the latest release preview), especially Windows 8. Heap security features. At the Black Hat 2012 conference, the two researchers will present their findings. “From the perspective of heap corruption, if I am an attacker, I would rather write exploit code for Windows 7, instead of Windows 8,” Valasek said, “Microsoft has come a long way.” The road, they have invested a lot of thoughts. & rdquo; Heap buffer overflow is more difficult to implement than stack-based buffer overflow. Heap-based attacks go beyond the memory space limit by malicious executables and essentially "spoof" the operating system to execute the command. Typically, an attacker can attack the system remotely, and if the buffer overflow attack succeeds, the attacker can gain the same system privileges as the attacked application or gain root-level access to the kernel. New features in Windows 8 include an updated memory manager, Windows Heap Manager, and the Windows Kernel Pool Allocator. The heap manager randomly allocates memory space, which makes it difficult for an attacker to predict where a buffer overflow attack should inject malicious code. In previous versions of Windows, memory space allocation was not random. Windows 8 also includes AppContainers, a security sandbox that determines permissions for Windows applications. Valasek said that Windows 8 applications are more tightly controlled than Windows Vista or Windows 7, after all, Windows Vista and Windows 7 rely on Integrity Level to control application functionality, knowing the integrity level. More relaxed than AppContainers. The security features of these updated Windows 8 are not Microsoft's first built-in security features into the operating system. Starting with Windows Vista, Microsoft uses Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to enhance application security and kernel protection. ASLR and DEP are not enabled by default, which is different from the memory protection of Windows 8. “These mitigations have been deployed to address security issues,” Valasek said. “They really make it harder to implement technology. However, exploits are ubiquitous. ”
What should I do if the Win10 flight mode cannot be turned off? Recently, some users found t
Solution: In Win8, everyones used IE browser has also been upgraded to the latest IE10, t
Windows 8 features: Telnet client service can remotely control the remote Telnet system. Mic
solution: win8 change the full name of the computer document “ locked by another user” m
How to set the virtual memory shortage? Win8/win8.1 virtual memory settings tutorial
How to use win10 night mode? Windows10 open night mode tutorial
Microsoft: pirated Windows can't upgrade Win8 with 98 yuan
Looking for the lost icons of Windows 8 desktop
Win10 default installation path modification method
u disk installed win8 system tutorial diagram
Why win8 set never sleep or sleep windows8 cancel sleep tutorial
Windows 8 operating system shutdown menu only sleep no sleep how to restore
Win8 diy your right-click menu
Win8 details: resource usage is less than Win7
This computer configuration line
VLC team revealed WP8.1 application in April later
How to solve the Win7 desktop icon is blocked
How Win10 uses the dism command to view the versions that can be upgraded to
Win10 system input method can not switch the solution
Win7 system open PDF file appears associated error how to do
How to solve the wireless network limitation of Windows8 system