Based on the FUZZING Lead to a New Mining Method Based on Windows Kernel Vulnerability

Hong-bo YAO,Liang YIN,Wei-ping WEN
DOI: https://doi.org/10.3969/j.issn.1671-1122.2011.12.002
2011-01-01
Abstract:With advances in technology, Windows operating system has improved steadily. Combining many memory protection technologies made the traditional buffer-overflow-based attacks to be more useless. In this case, the kernel vulnerability can be used to break through the security line of defense as a starting point. This paper researches the existing mining Windows kernel vulnerability, then proposes a methods on how to find Windows kernel vulnerability based on Fuzzing, summarizes the existing Fuzzing technology, selects three kernel Fuzzing goal which are Windows win32k.sys processing of window messages, third-party driver for IoControlCode processing, security software on the SSDT, ShadowSSDT function of processing, after the analysis of the three principles, Fuzzing data are designed and data input path are identified. Finally, using this method found in case of Windows operating system unknown vulnerabilities verify the validity of the method.
What problem does this paper attempt to address?