期刊文献+

基于可执行代码的漏洞检测技术 被引量:2

Executable based vulnerability detection
原文传递
导出
摘要 源代码和可执行代码之间存在语义差异,仅对源代码进行分析会遗漏隐藏在可执行代码里的漏洞。基于对漏洞模式的分析,通过结合静态反汇编分析、动态自动调试和基于函数特征的参数注入3种思想,本文设计并实现了一种直接基于可执行代码的安全漏洞检测原型工具。本文的检测原型工具在一组CVE(通用漏洞披露)benchmark以及两个真实的可执行程序上都检测到缓冲区溢出漏洞。实验结果表明,本文提出的"三位一体"检测方法能够直接用于检测可执行代码中的安全漏洞。 Since there are semantic differences between a source code and its executable code,analysis of only the source code may miss some vulnerabilities in the executable code.Typical vulnerability patterns were analyzed to design a security vulnerability detection tool to work directly on executables.The system combines static disassembly analysis,dynamic auto-debugging and function based argument injection.The tool successfully found buffer overflow vulnerabilities in both a CVE(common vulnerabilities & exposures) benchmark and two real executables.The results show that this detection method can be used to directly detect security vulnerabilities in executable codes.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第S2期2176-2180,共5页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金资助项目(60473057 90604007 90718017 980818021) 国家"八六三"高技术项目(2007AA012463) 教育部高等学校博士学科点专项科研基金(20070006055)
关键词 漏洞检测 可执行代码 反汇编分析 自动调试 参数注入 vulnerability detection executables disassembly analysis auto-debug argument injection
  • 相关文献

参考文献10

  • 1Balakrishnan G,Reps T,Melski Det al.WYSI NWYX:What you see is not what you execute. VerifiedSoftware:Theories,Tools,Experi ments (VSTTE) . 2005
  • 2Balakrishnan G,Reps T.Analyzing memory accesses in x86executables. Compiler Construction (CC) . 2004
  • 3Reps T,Balakrishnan G,Li m Jet al.A next-generationplatformfor analyzing executables. Asian SymposiumonProgramming Languages and Systems (APLAS) . 2005
  • 4Balakrishnan G,Gruian R,Reps Tet al.CodeSurfer/x86:A platform for analyzing x86 executables. CompilerConstruction (CC) . 2005
  • 5Reps T,Balakrishnan G,Li mJ.Intermediate-representationrecovery from low-level code. Partial Evaluation andSemantics-Based Program Manipulation (PEPM) . 2006
  • 6Balakrishnan G,Reps T.I mproved memory-access analysisfor x86 executables. Compiler Construction (CC) . 2008
  • 7Anderson P,Zarins M.The CodeSurfer softwareunderstanding platform. International Workshop onProgram Comprehension (I WPC) . 2005
  • 8Nanda S,Li W,LamL Cet al.BIRD:Binaryinterpretationusing runti me disassembly. Code Generation andOpti mization (CGO) . 2006
  • 9Nanda S,Li W,Lam L Cet al.Foreign code detection onthe Windows/x86 platform. Annual Computer SecurityApplications Conference (ACSAC) . 2006
  • 10Ku K,Hart T,Chechik Met al.A buffer overflowbenchmark for software model checkers. AutomatedSoftware Engineering (ASE) . 2007

同被引文献6

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部