期刊文献+

一种层次化的安全补丁比较技术 被引量:2

Hierarchical Comparison of Executable Objects Based on Patches
下载PDF
导出
摘要 安全补丁比较技术能有效揭示同一程序补丁前后的差异,通过差异分析得到所补漏洞的详细信息.提出一种层次化的安全补丁比较方法,设计并实现了一个层次化的安全补丁比较分析原型系统.首先利用结构化的比较方法基于函数调用图和函数控制流图进行程序分析,然后利用指令级图形化的比较方法从指令级分析程序的变化.该方法融合了图形化和结构化比较算法的优点,独立于CPU体系结构,能找出结构化和非结构化变动,实验证明了层次化比较方法的有效性,具有较低的误报率和漏报率. Comparison of security patches is able to detect the changes between different versions of executables, analyzing changes can get the specific information of security vulnerability. This paper presents a security patch hierarchical comparison technology for discovery security vulnerability information, first uses structural comparison to compare program in call graph and control flow graph level, then use graphic comparison to detect instruction change in instruction level. This method utilizes strongpoint of both graphic and structural comparison, performs less false positive and false negative, is almost completely independence of the underlying CPU architecture and get unstructured changes. A prototype system of security patch analysis tool is designed and implemented which is proved by experiment that this method can effectively discover the changes because of the patch.
出处 《小型微型计算机系统》 CSCD 北大核心 2008年第11期2065-2069,共5页 Journal of Chinese Computer Systems
基金 国家"八六三"高技术研究发展计划基金项目(2006AA01Z449)资助 安徽省优秀青年科技基金项目(04042046)资助 中国科学技术大学研究生创新基金项目(KD2007055)资助
关键词 安全补丁 图形化比较 结构化比较 层次化比较 security patch graphic comparison structural comparison hierarchical comparison
  • 相关文献

参考文献7

  • 1Scott McFarling, Zheng Wang, Ken Pierce. Bmat: a binary matching tool[C]. Znd ACM Workshop on Feedback-Directed Optimization, November 1999.
  • 2Scott McFarling, Zheng Wang, Ken Pierce. Bmat-a binary matching tool for stale profile propagation[J]. The Journal of Instruction-Level Parallelism(JILP), 2, May 2000.
  • 3Halvar Flake. Structural comparison of executable objects[C]. In DIMVA, 2004, 161-173, 2004.
  • 4Thomas Dullien, Ruhr-Universitaet Boehum. Graph-based comparison of executable objeets[EB/OL], http://www, sabre-security, eom/files/BinDiffSSTIC05, pdf, 2005.
  • 5Todd Sabin. Comparing binaries with graph isomorphism[EB/ OL]. http://razor, bindview, corn/publish/papers/comparingbinaries, html, 2004.
  • 6Douglas B West. Introduction to graph theory[M]. Second Edition, Prentice Hall/Pearson, 2001.
  • 7Steven S Muchnick. Advanced compiler design and implementation[M]. Morgan Kaufmann, 1997.

同被引文献23

  • 1曾鸣,赵荣彩,王小芹,姚京松.一种基于反汇编技术的二进制补丁分析方法[J].计算机科学,2006,33(10):283-287. 被引量:9
  • 2CUI Baojiang, LI Jiansong, GUO Tao, WANG Jianxin, MA Ding. Code comparison system based on abstract syntax tree [C]// Proceedings of 4th IEEE International Conference on Broadband Network & Multimedia Technology. Beijing, China:IEEE Press, 2010, 668-673.
  • 3Toshihiro Kanfiya, Shinji Kusumoto, Katsuro Inoue. CCFinder: A multilinguistie token-based code clone detection system for large scale source code [J]. IEEE Transactions on Software Engineering, 2002, 28(7) : 654 - 670.
  • 4Sabin T. Comparing binaries with graph isomorphism [Z/OL]. (2011-06-20), http: //razor. bindview, corn/publish/ papers/comparig-binaries, html.
  • 5Halvar Flake. Structural comparison of executable ofobjects [Z/OL]. (2011-06-20), http: //www. sabre-security, corn/ files/dimva_paper2pdf.
  • 6Thomas Dullien, Roll Rolles. Graph-based comparison of executable objects [Z/OL]. (2011-06-20), http: //www. sabre-security, com/files/BinDiffSSTIC05, pdf.
  • 7魏强.结构化签名和签名结构化[Z/OL].(2011-06-20),http://www.xfocus.net.
  • 8BAYER U,KIRDA E,KRUEGEL C.Improving the Efficiency of Dynamic Malware Analysis[C]∥Symposium on Applied Comput-ingm.New York:ACM,2010:1871-1878.
  • 9KINABLE J,KOSTAKIS O.Malware classification based on call graph clustering[J].Journal in Computer Virology,2010,7(1):1-13.
  • 10CESARE S,Y XIANG.Classification of malware using structured control flow[C]∥Proc of the8th Australasian Symposium on Paral-lel and Distributed Computing.Australian:Computer Society,2010:61-70.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部