期刊文献+

基于可信基点的结构化签名比较算法 被引量:2

Structural comparing algorithm based on trusted base points
下载PDF
导出
摘要 提出了一种基于可信基点的结构化签名比较算法,对现有的结构化签名比较算法在基点初始化和传播过程中的不足进行了改进,并证明了改进的算法更可信。同时,通过增加循环属性、相同参数信息等方法作为新的划分属性采更细致地刻画函数信息,提高了可信基点在初始化和传播过程中的正确性和匹配率。还提出了一种启发式策略对比较结果是否存在错误匹配进行校验。 A structural signature's comparing algorithm based on trusted base points is presented, which improves current algorithm on base-points initialization and propagation, and has proved that our algorithm is more trusted than the former. At the same time, by adding new partitioning properties such as loop and same number of parameters to describe functions,, the algorithm gains improvement on correctness and matching ratio. And a heuristic strategy is presented to verify if there is any mismatching in comparing result.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第24期5850-5853,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2003AA146010)
关键词 结构化签名 可信基点 划分属性 启发式校验 补丁安全性 structural signature trusted base point partitioning properties heuristic verification patch's security
  • 相关文献

参考文献10

  • 1Baker S, Manber U, Robert Muth. Compressing differences of executable code[C]. Atlanta,GA,USA:ACM SIGPLAN workshop on Compiler Support for System Sofl-ware(WCSS), 1999: 1-10.
  • 2Pocket Soft Inc. RTPatch-sofl-ware update tool [EB/OL] .hap:// www.pocketsoft.com/whitepapers/whitepaper.html.
  • 3Wang Zheng, Ken Pierce, Scott McFarling. BMAT-a binary matching tool for stale profile propagation[J] .Journal of Instruction-Level Parallelism(JILP),2000,2(5): 1-6.
  • 4Wang Zheng. Progressive profiling: A methodology based on profile propagation and selective profile collection [D]. Doctor Thesis of Computer Science of Harvard University,2001.
  • 5Flake H.Structural comparison of executable objects[C].Dortmund:Proceedings of the IEEE Conference on Detection of Intrusions and Malware and Vulnerability Assessment(DIMVA), 2004:161-173.
  • 6Greg Hoglund,Gary McGraw.Exploiting software: How to break code[M].Addison Wesley,2004:92-104.
  • 7Tod Sabin. Comparing binaries with graph isomorphisms [EB/OL] .http://razor.bindview.com/publish/papers/comparing-binaries.html,2004.
  • 8Dullien T, Rolles R.Graph-based comparison of executable objects [EB/OL] .http://www.sabre-security.com/files/BinDiffSSTIC05.pdf,2005.
  • 9Funnywei,structural signature and structuring signature[EB/OL]. http://xcon.xfocus.net/archives/2005/xcon2005_funnywei.pdf, 2005.
  • 10DataRescue,IDA Pro disassembler[EB/OL].http://www.datarescue.com/idabase,2006.

同被引文献17

  • 1曾鸣,赵荣彩,姚京松,王小芹.基于特征提取的二进制代码比较技术[J].计算机工程与应用,2006,42(22):8-11. 被引量:6
  • 2谢余强,曾颖,舒辉.改进的基于图的可执行文件比较算法[J].计算机工程与设计,2007,28(2):257-260. 被引量:4
  • 3CUI Baojiang, LI Jiansong, GUO Tao, WANG Jianxin, MA Ding. Code comparison system based on abstract syntax tree [C]// Proceedings of 4th IEEE International Conference on Broadband Network & Multimedia Technology. Beijing, China:IEEE Press, 2010, 668-673.
  • 4Toshihiro Kanfiya, Shinji Kusumoto, Katsuro Inoue. CCFinder: A multilinguistie token-based code clone detection system for large scale source code [J]. IEEE Transactions on Software Engineering, 2002, 28(7) : 654 - 670.
  • 5Sabin T. Comparing binaries with graph isomorphism [Z/OL]. (2011-06-20), http: //razor. bindview, corn/publish/ papers/comparig-binaries, html.
  • 6Halvar Flake. Structural comparison of executable ofobjects [Z/OL]. (2011-06-20), http: //www. sabre-security, corn/ files/dimva_paper2pdf.
  • 7Thomas Dullien, Roll Rolles. Graph-based comparison of executable objects [Z/OL]. (2011-06-20), http: //www. sabre-security, com/files/BinDiffSSTIC05, pdf.
  • 8魏强.结构化签名和签名结构化[Z/OL].(2011-06-20),http://www.xfocus.net.
  • 9刘光宏,吴刚,章文,朱明,帅建梅.一种层次化的安全补丁比较技术[J].小型微型计算机系统,2008,29(11):2065-2069. 被引量:2
  • 10宋杨,张玉清.结构化比对算法研究及软件实现[J].中国科学院研究生院学报,2009,26(4):549-554. 被引量:3

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部