期刊文献+

操作系统安全机制复合行为模型掘取技术研究 被引量:1

Research on technology of complex behavior model mining for operating system security mechanism
下载PDF
导出
摘要 以信息安全理论和软件逆向工程技术为依托,研究了操作系统安全机制复合行为模型掘取技术及其实现方法和技术路线。通过结合操作系统的多尺度软件逆向理解技术,对操作系统安全机制的相关程序进行逆向分析、模型掘取和形式化描述,从而发现潜在漏洞、后门、隐通道等操作系统高层安全机制存在的安全问题,为实施修补、反制及利用等相应安全措施提供有力依据。在该技术基础上实现了一套原型系统,实验验证该系统的程序理解和模型掘取结果满足要求。 Based on theories of information security and technology of software reverse engineering, studied the technology and realizable method of complex behavior model mining for operating system security mechanism. By using the technologies of multi-scale program comprehension, reverse analysis, model mining and formal description to the programs correlative with operating system security mechanism, found security problems of security mechanism, such as leaks, back doors, covert channels and so on, in order to provide the conclusive evidences for security defence measures. A prototype was implemented and used to verify the security of operating system. The result of program comprehension and model mining satisfies requirements.
出处 《计算机应用研究》 CSCD 北大核心 2009年第1期314-316,共3页 Application Research of Computers
基金 国家"863"计划资助项目(2006AA01Z406)
关键词 操作系统安全机制 静态分析 程序理解 模型掘取 形式化描述 operating system security mechanism static analysis program comprehension model mining formal description
  • 相关文献

参考文献6

  • 1刘海燕,杨洪路,王崛.C源代码静态安全检查技术[J].计算机工程,2004,30(2):28-30. 被引量:9
  • 2HOLLINGWORTH D S, GLASEMAN M, HOPWOOD. Security test and evaluation tools : an approach to operating system security analysis [ M]. Calif:Rand Corp, Santa Monica, 1974:5298.
  • 3夏一民,罗军,张民选.基于静态分析的安全漏洞检测技术研究[J].计算机科学,2006,33(10):279-282. 被引量:29
  • 4LIONEL C B. The experimental paradigm in reverse engineering-role, challenges and limitations[ C ]//Proc of the 13th Working Conference on Reverse Engineering ( WCRE' 06 ). Benevento: IEEE Computer Society, 2006.
  • 5JENS K, DIRK M, MATTHIAS N. Understanding software architectures by visualization-an experiment with graphical elements [ C ]// Proc of the 13th Working Conference on Reverse Engineering ( WCRE' 06). Benevento : IEEE Computer Society,2006.
  • 6张阔,徐鹏,李涓子,王克宏.基于优化层次聚类的文档逻辑结构抽取[J].清华大学学报(自然科学版),2005,45(4):471-474. 被引量:2

二级参考文献31

  • 1[1]Wagner D,Foster J,Brewer E, et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.In Proceedings of the Year 2000 Network and Distributed System Security Symposium(NDSS),San Diego, CA,2000:3-17
  • 2[2]Biega J.ITS4:A Static Vulnerability Scanner for C and C++ Code. http://www.rstcorp.com
  • 3[3]Bishop M,Dlger M.Checking for Race Conditions in File Access.Computing Systems, 1996,9(2): 131 - 152
  • 4[4]Austin T M,Breach S E,Sohi G S.Efficient Detection of All Pointer and Array Access Errors. http://citeseer.nj.nec.com/1096.html
  • 5Ashish N, Knoblock C. Wrapper generation for semi-structured internet sources [J]. ACM SIGMOD Record, 1997, 26(4): 8 - 15.
  • 6Kaufman L, Rousseeuw P J. Finding Groups in Data: An Introduction to Cluster Analysis [M]. New York: Wiley,1990.
  • 7Richard O D, Peter E H, David G S. Pattern Classification(2nd edition) [M]. New York: John Wiley & Sons, 2001.550 - 556.
  • 8Tai K C. The tree-to-tree correction problem [J]. Journalof the ACM, 1979, 26(3) : 422-433.
  • 9Mitchell J C.Programming language methods in computer security.ACM POPL,UK,2001
  • 10Cousot P,Cousot R.Abstract interpretation:a unified lattice model for static analysis of programs by construction or approximation of fixpoints.ACM POPL,USA,1977

共引文献36

同被引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部