¿ù°£ Àα⠰Խù°

°Ô½Ã¹° 256°Ç
   
°¡»óÈ­ Áö¿øÈ®ÀÎ - Securable
±Û¾´ÀÌ : ÃÖ°í°ü¸®ÀÚ ³¯Â¥ : 2009-12-18 (±Ý) 21:12 Á¶È¸ : 8194
±ÛÁÖ¼Ò :
                                
ÀÌ ¾ÖÇø®ÄÉÀ̼ÇÀº ÇöÀç ÀÚ½ÅÀÌ »ç¿ëÇÏ°í ÀÖ´Â CPU°¡ º¸¾È¿¡ ¾î´À Á¤µµ ´ëÀÀÀ» ÇÏ°í Àִ°¡¸¦ 3°¡Áö ¿µ¿ªÀ» Áß½ÉÀ¸·Î Á¡°ËÇÏ´Â °£´ÜÇÑ µµ±¸´Ù. 

±é½¼Àº ¼¼ °¡Áö Ç׸ñÀ» ¸®½ºÆ®¾÷Çß´Ù.

  • 1) 64-bit instruction extensions,
  • 2) Hardware support for detecting and preventing the execution of code in program data areas (DEP)
  • 3) Hardware support for system resource ¡°virtualization.¡±

    º¸¾È»ó ÁÖ¿ä ÀåÁ¡À» ¿ä¾àÇÏ¸é ´ÙÀ½°ú °°´Ù.

    64ºñÆ® ÀνºÆ®·°¼Ç - 64ºñÆ® À©µµxp ¹× À©µµ 2003, ºñ½ºÅ¸ ¿î¿µÀÌ °¡´ÉÇϱ⠶§¹®¿¡ °ú°Å 32ºñÆ®¿¡¼­ ºñ·ÔµÈ º¸¾È ¹®Á¦¸¦ ÀϺΠÇØ°áÇÒ ¼ö ÀÖ´Ù.

    Çϵå¿þ¾î DEP - CPU ¿¬»ê °úÁ¤¿¡¼­ unchecked buffer°¡ ¹öÆÛ ¿À¹ö·±À¸·Î ÂøÃë ´çÇÏ´Â ¸ðµç ¹æ½ÄµéÀ» °ËÃâ, ºí·ÎÅ· µîÀÌ °¡´ÉÇÏ´Ù. ¾ÇÀÇÀûÀÎ ÇØÄ¿ÀÇ °ø°ÝÀ» ÀϺΠ¸·À» ¼ö ÀÖ´Ù.

    Çϵå¿þ¾î °¡»óÈ­ - ¸®¾ó OS¿Í ½ÇÁ¦ ¼ÒÇÁÆ®¿þ¾î »çÀÌÀ» ¶³¾î ¶ß¸®°í °¡¿îµ¥ °¡»óÀÇ °³³äÀ» ³Ö¾î º¸¾ÈÀÌ °­È­µÆ´Ù. ½Ã½ºÅÛ Ä¿³Î¿¡ Á¢±ÙÇÏ´Â ¾Ç¼º Äڵ带 ÀϺΠ¸·À» ¼ö ÀÖ´Ù.

    ƯÈ÷ ÃÖ±Ù À©µµ7ÀÇ À©µµXP °¡»óÈ­ ¸ðµå°ú °ü½ÉÀ» ¹ÞÀ¸¸é¼­, 3¹ø Ç׸ñÀÎ °¡»óÈ­ Å×½ºÆ®°¡ À̽´·Î ¶°¿Ã¶ú´Ù. À©µµ7ÀÇ 'À©µµXP °¡»óÈ­' ±â´ÉÀ» »ç¿ëÇϱâ À§Çؼ­´Â ÀÚ½ÅÀÇ CPU°¡ °¡»óÈ­°¡ Áö¿øµÇ´ÂÁö È®ÀÎÇÏ´Â °ÍÀÌ ÁÁ°Ú´Ù. º¸±ÞÇü Á¦Ç° »ó´ç¼ö°¡ Áö¿øÀ» ÇÏÁö ¾Ê´Â´Ù.

    ¶ÇÇÑ °ð ³»³õ°Ô µÉ ÇÁ¸®¿þ¾î DEPutyÀÇ °æ¿ì, 2¹ø Ç׸ñÀΠÇϵå¿þ¾î DEP¸¦ Á¦´ë·Î Áö¿øÇÏ´ÂÁö, ¶Ç Áö¿øÇÑ´Ù¸é ±â´ÉÀ» ¼±ÅÃÇÒ ¼ö ÀÖ´ÂÁö Á¡°ËÇÏ°í µ¿ÀÛÄÉ ÇÏ´Â °ÍÀÌ µÉ Àü¸ÁÀÌ´Ù.

     

    ¾Æ·¡´Â ¿Ö ¼¼ °¡Áö Ç׸ñÀÌ º¸¾È Å×½ºÆ®¸¦ À§ÇØ Áß¿äÇÑÁö ¼³¸íÇÏ´Â ÀÚ·á ¿ø¹®ÀÌ´Ù.

    • How do 64-bit instructions help with security?

    64-bit-capable processors have the ability to run the 64-bit versions of Microsoft's substantially more secure XP, Windows 2003, and Vista operating systems. Those operating systems are more secure because Microsoft, having learned many lessons from mistakes in the past, made the firm decision to lock-down their 64-bit OS kernels. The 64-bit Windows kernels actively police themselves to guard against many rootkit-style and other kernel attacks that have caused so many problems for users of the 32-bit Windows operating systems.

    These advanced kernel-protection technologies cannot be ported back into current or even future versions of Microsoft's 32-bit operating systems because doing so would ¡°break¡± so many existing programs and drivers as to make the system impossible to use. Microsoft knows that one day the personal computing industry will have moved over to 64-bit operating systems much as we all once moved from the 16-bit based systems to 32-bits.

    SecurAble indicates by displaying either a ¡°32¡± or a ¡°64¡± whether the system's processor has the 64-bit instructions or extensions necessary to run 64-bit versions of Microsoft's present and future operating systems.

     
    • How does Hardware DEP help with security?

    As was mentioned in the boxes above, hardware support for DEP is the single most exciting and potentially powerful technology for detecting, blocking, and preventing all manner of exploitation of ¡°unchecked buffer¡± buffer overruns in Windows. Hardware-enforced DEP is the malicious hacker's worst nightmare since it has the potential to catch and stop nearly all Internet-style remote communications buffer overflow attacks.

     
    • How does Hardware Virtualization help with security?

    ¡°Virtual Machine¡± technology is used to create fully contained environments that can be used to insulate the real hosting operating system from any actions taken by software running within the ¡°virtual¡± environment. Although this security benefiting virtual machine technology has been used for many years, its widespread adoption has been slowed down by the significant performance overhead imposed by software emulation of the virtual environment. Intel's and AMD's native hardware support for virtual machines means that virtually all of this emulation overhead can be eliminated from both the host and virtual environments. This makes the use of virtual machines for security containment much more practical.

    The second benefit of hardware support is that even malicious software running with maximum privileges in the system's kernel is unable to escape from virtual containment. Thus, hardware support for virtual machine technology introduces the possibility of creating a ¡°hypervisor¡± to operate at a hardware-enforced level below the operating system ¡°supervisor¡± which opens many exciting possibilities for further enhancing the system's security. It will likely be several years before these capabilities are offered natively within Windows, but we might expect to see third-party security software publishers taking advantage of these features in the near future.






  •  

    À̸§ Æнº¿öµå
    ºñ¹Ð±Û (üũÇÏ¸é ±Û¾´À̸¸ ³»¿ëÀ» È®ÀÎÇÒ ¼ö ÀÖ½À´Ï´Ù.)
    ¿ÞÂÊÀÇ ±ÛÀÚ¸¦ ÀÔ·ÂÇϼ¼¿ä.
       

     



     
    »çÀÌÆ®¸í : ¸ðÁö¸®³× | ´ëÇ¥ : ÀÌ°æÇö | °³ÀÎÄ¿¹Â´ÏƼ : ·©Å°´åÄÄ ¿î¿µÃ¼Á¦(OS) | °æ±âµµ ¼º³²½Ã ºÐ´ç±¸ | ÀüÀÚ¿ìÆí : mojily°ñ¹ðÀÌchonnom.com Copyright ¨Ï www.chonnom.com www.kyunghyun.net www.mojily.net. All rights reserved.