<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">glonucsec</journal-id><journal-title-group><journal-title xml:lang="ru">Глобальная ядерная безопасность</journal-title><trans-title-group xml:lang="en"><trans-title>Global Nuclear Safety</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">2305-414X</issn><issn pub-type="epub">2499-9733</issn><publisher><publisher-name>National Research Nuclear University "MEPhI"</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.26583/GNS-2020-03-01</article-id><article-id custom-type="elpub" pub-id-type="custom">glonucsec-29</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ПРОБЛЕМЫ ЯДЕРНОЙ, РАДИАЦИОННОЙ И ЭКОЛОГИЧЕСКОЙ БЕЗОПАСНОСТИ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>THE PROBLEMS OF NUCLEAR, RADIATION AND ECOLOGICAL SAFETY</subject></subj-group></article-categories><title-group><article-title>ПРЕДОТВРАЩЕНИЕ АТАК НА ПРОСТЕЙШИЕ ПРИЛОЖЕНИЯ С УЯЗВИМОСТЯМИ ПУТЕМ ПРОВЕРКИ СОВЕРШАЕМЫХ ИМИ СИСТЕМНЫХ ВЫЗОВОВ</article-title><trans-title-group xml:lang="en"><trans-title>Preventing Attacks on the Easiest Applications with Vulnerabilities by Verification of Their Committed System Calls</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-6947-8753</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Паринов</surname><given-names>М. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Parinov</surname><given-names>M. A.</given-names></name></name-alternatives><email xlink:type="simple">mafimka@gmail.com</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-4559-7763</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Сироткина</surname><given-names>А. Г.</given-names></name><name name-style="western" xml:lang="en"><surname>Sirotkina</surname><given-names>A. G.</given-names></name></name-alternatives><email xlink:type="simple">sag@sarfti.ru</email><xref ref-type="aff" rid="aff-2"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Национальный исследовательский ядерный университет «МИФИ»<country>Россия</country></aff><aff xml:lang="en">Institute of Nuclear Physics and Technology (INP&amp;T), National Research Nuclear University «MEPhI»<country>Russian Federation</country></aff></aff-alternatives><aff-alternatives id="aff-2"><aff xml:lang="ru">Саровский физико-технический институт - Национальный исследовательский ядерный университет «МИФИ»<country>Россия</country></aff><aff xml:lang="en">SARFTI - National Research Nuclear University «MEPhI»<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2020</year></pub-date><pub-date pub-type="epub"><day>01</day><month>09</month><year>2020</year></pub-date><volume>0</volume><issue>3</issue><fpage>7</fpage><lpage>17</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Паринов М.А., Сироткина А.Г., 2022</copyright-statement><copyright-year>2022</copyright-year><copyright-holder xml:lang="ru">Паринов М.А., Сироткина А.Г.</copyright-holder><copyright-holder xml:lang="en">Parinov M.A., Sirotkina A.G.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://glonucsec.elpub.ru/jour/article/view/29">https://glonucsec.elpub.ru/jour/article/view/29</self-uri><abstract><p>Проблема выявления и предотвращения атак на приложения была и остается одной из актуальных задач информационной безопасности. Изъяны в коде программ приводят к нарушению нормальной работы программного обеспечения. Из-за недочетов разработки могут возникать нарушения целостности, доступности и конфиденциальности данных, прерывание выполнения запущенных процессов или даже системы в целом. Целью данной работы является предотвращение атаки на приложение путем переполнения буфера с помощью разработанного комплекса по предотвращению атак. Для выполнения поставленной цели кратко рассматриваются недостатки современных систем по предотвращению атак на приложения, рассматривается структура разработанного программного комплекса, алгоритмы работы каждого из модуля программного комплекса, механизм совершения переполнения буфера, а также тестируется разработанный программный комплекс на простейшем переполнении буфера.</p></abstract><trans-abstract xml:lang="en"><p>The issue of detecting and preventing attacks on applications has been and remains one of the urgent tasks of information security. Flaws in the program code lead to disruption of the normal operation of the software. Data integrity, availability and confidentiality of the data, interruption of the execution of running processes or even the system as a whole may occur due to design flaws. The aim of this work is to prevent attacks on the application by overflowing the buffer using the developed complex to prevent attacks. To achieve this goal, the shortcomings of modern systems for preventing attacks on applications are briefly reviewed, the structure of the developed software package, the operation algorithms of each module of the software package, the mechanism for buffer overflows are examined, and the developed software package is tested on a simple buffer overflow.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>переполнение буфера</kwd><kwd>системные вызовы</kwd><kwd>инъекции кода</kwd><kwd>неисполняемый стек</kwd><kwd>информационная безопасность</kwd></kwd-group><kwd-group xml:lang="en"><kwd>StackGuard</kwd><kwd>ASRL</kwd><kwd>buffer overflow</kwd><kwd>system calls</kwd><kwd>code injection</kwd><kwd>data execution prevention</kwd><kwd>ASLR</kwd><kwd>StackGuard</kwd><kwd>information security</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Wonsun Ahn, Yuelu Duan and Josep Torrellas «DeAliaser: Alias Speculation using Atomic Region Support» : публикации проекта LLVM. - 2013. - Р. 167-168. - URL : &lt;http://dl.acm.org/citation.cfm?id=2451136&gt; (дата обращения: 07.10.2018).</mixed-citation><mixed-citation xml:lang="en">Wonsun Ahn, Yuelu Duan and Josep Torrellas «DeAliaser: Alias Speculation using Atomic Region Support» : публикации проекта LLVM. - 2013. - Р. 167-168. - URL : &lt;http://dl.acm.org/citation.cfm?id=2451136&gt; (дата обращения: 07.10.2018).</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Gerardo Richarte «Four different tricks to bypass StackShield and StackGuard protection». - URL : https://www.cs.purdue.edu/homes/xyzhang/spring07/Papers/defeat-stackguard.pdf (дата обращения: 06.08.2018).</mixed-citation><mixed-citation xml:lang="en">Gerardo Richarte «Four different tricks to bypass StackShield and StackGuard protection». - URL : https://www.cs.purdue.edu/homes/xyzhang/spring07/Papers/defeat-stackguard.pdf (дата обращения: 06.08.2018).</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Erik Buchanan, Ryan Roemer, Stefan Savage, Hovav Shacham «Return-oriented Programming: Exploitation without Code Injection». - URL : https://www.blackhat.com/presentations/bh-usa-08/Shacham/BH_US_08_Shacham_Return_Oriented_Programming.pdf (дата обращения: 22.10.2018).</mixed-citation><mixed-citation xml:lang="en">Erik Buchanan, Ryan Roemer, Stefan Savage, Hovav Shacham «Return-oriented Programming: Exploitation without Code Injection». - URL : https://www.blackhat.com/presentations/bh-usa-08/Shacham/BH_US_08_Shacham_Return_Oriented_Programming.pdf (дата обращения: 22.10.2018).</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage «When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC». - URL : http://cseweb.ucsd.edu/~savage/papers/CCS08GoodInstructions.pdf (дата обращения: 22.10.2018).</mixed-citation><mixed-citation xml:lang="en">Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage «When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC». - URL : http://cseweb.ucsd.edu/~savage/papers/CCS08GoodInstructions.pdf (дата обращения: 22.10.2018).</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Hovav Shacham «The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)». - URL : https://hovav.net/ucsd/dist/geometry.pdf (дата обращения: 21.10.2018).</mixed-citation><mixed-citation xml:lang="en">Hovav Shacham «The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)». - URL : https://hovav.net/ucsd/dist/geometry.pdf (дата обращения: 21.10.2018).</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Tyler Durden «Bypassing PaX ASLR protection». - URL : http://phrack.org/issues/59/9.html (дата обращения: 09.11.2018).</mixed-citation><mixed-citation xml:lang="en">Tyler Durden «Bypassing PaX ASLR protection». - URL : http://phrack.org/issues/59/9.html (дата обращения: 09.11.2018).</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Hector Marco, Ismael Ripoll «AMD Bulldozer Linux ASLR weakness: Reducing entropy by 87.5%». - URL : http://hmarco.org/bugs/AMD-Bulldozer-linux-ASLR-weakness-reducing-mmaped-files-by-eight.html (дата обращения: 09.11.2018).</mixed-citation><mixed-citation xml:lang="en">Hector Marco, Ismael Ripoll «AMD Bulldozer Linux ASLR weakness: Reducing entropy by 87.5%». - URL : http://hmarco.org/bugs/AMD-Bulldozer-linux-ASLR-weakness-reducing-mmaped-files-by-eight.html (дата обращения: 09.11.2018).</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Tilo Muller «ASLR Smack &amp; Laugh Reference». - URL : https://ece.uwaterloo.ca /~vganesh/TEACHING/S2014/ECE458/aslr.pdf (дата обращения: 10.11.2018).</mixed-citation><mixed-citation xml:lang="en">Tilo Muller «ASLR Smack &amp; Laugh Reference». - URL : https://ece.uwaterloo.ca /~vganesh/TEACHING/S2014/ECE458/aslr.pdf (дата обращения: 10.11.2018).</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Ralf Hund, Carsten Willems, Thorsten Holz «Practical Timing Side Channel Attacks Against Kernel Space ASLR». - URL : https://www.ieee-security.org/TC/SP2013/papers/4977a191.pdf (дата обращения: 10.11.2018).</mixed-citation><mixed-citation xml:lang="en">Ralf Hund, Carsten Willems, Thorsten Holz «Practical Timing Side Channel Attacks Against Kernel Space ASLR». - URL : https://www.ieee-security.org/TC/SP2013/papers/4977a191.pdf (дата обращения: 10.11.2018).</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Паринов, М. А. Анализ существующих средств защиты от переполнения буфера на стеке и способы их обхода / М. А. Паринов // Глобальная ядерная безопасность. - 2019. - № 2(31). - С. 15-22.</mixed-citation><mixed-citation xml:lang="en">Паринов, М. А. Анализ существующих средств защиты от переполнения буфера на стеке и способы их обхода / М. А. Паринов // Глобальная ядерная безопасность. - 2019. - № 2(31). - С. 15-22.</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Фомичeв В. М. Методы дискретной математики в криптологии / В. М. Фомичев. - Москва : ДИАЛОГ-МИФИ, 2010. - 424 с.</mixed-citation><mixed-citation xml:lang="en">Фомичeв В. М. Методы дискретной математики в криптологии / В. М. Фомичев. - Москва : ДИАЛОГ-МИФИ, 2010. - 424 с.</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Wenliang Du. «Computer Security: A Hands-on Approach». - URL : http://www.cis.syr.edu/~wedu/seed/Book/book_sample_buffer.pdf (дата обращения: 14.11.2019).</mixed-citation><mixed-citation xml:lang="en">Wenliang Du. «Computer Security: A Hands-on Approach». - URL : http://www.cis.syr.edu/~wedu/seed/Book/book_sample_buffer.pdf (дата обращения: 14.11.2019).</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole «Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade». - URL : https://www.researchgate.net/publication/232657947_Buffer_Overflows_Attacks_and_Defenses_for_the_Vulnerability_of_the_Decade (дата обращения: 10.02.2020).</mixed-citation><mixed-citation xml:lang="en">Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole «Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade». - URL : https://www.researchgate.net/publication/232657947_Buffer_Overflows_Attacks_and_Defenses_for_the_Vulnerability_of_the_Decade (дата обращения: 10.02.2020).</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">James C. Foster Vitaly Osipov Nish Bhalla Niels Heinen «Buffer Overflow Attacks DETECT, EXPLOIT, PREVENT». - URL : http://index-of.es/Varios/Securite/BoF_Attacks.pdf (дата обращения: 10.02.2020).</mixed-citation><mixed-citation xml:lang="en">James C. Foster Vitaly Osipov Nish Bhalla Niels Heinen «Buffer Overflow Attacks DETECT, EXPLOIT, PREVENT». - URL : http://index-of.es/Varios/Securite/BoF_Attacks.pdf (дата обращения: 10.02.2020).</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
