期刊文献+

基于污点分析的源代码脆弱性检测技术 被引量:12

Source Code Vulnerability Detection Technology Based on Taint Analysis
下载PDF
导出
摘要 基于源代码的静态分析技术是检测软件脆弱性的一种重要手段.针对不可信数据输入导致软件脆弱性的问题,提出一种基于污点分析的脆弱性检测方法.通过跟踪程序参数、环境变量等各种外部输入,标记输入的类型,在构造控制流图基础上,利用数据流分析中的相关信息,污点传播至各类脆弱性函数,从而解决缓冲区溢出、格式化字符串等问题.利用控制流、数据流分析的相关信息,提高了准确率,降低了漏报率.实验表明,该技术是一种有效的脆弱性分析方法. Static analysis technology is a significant method to detect software vulnerabilities. To cope with the problem of untrusting data inputs leading to software vulnerabilities, presents a vulnerability detection method based on taint analysis. It tracks various kinds of input including program parameters and environment variables ,marks the type of input, after constructing the control flow graph, makes use of dataflow information, propagating the taint data to the vulnerability functions, to settle the problem of buffer overflow and format string. It utilizes the related information of control flow and dataflow dur- ing this process, thus improves the accuracy and decreases the false negatives. It is proved by experiment that this technology is an effective vulnerability analysis method.
出处 《小型微型计算机系统》 CSCD 北大核心 2009年第1期78-82,共5页 Journal of Chinese Computer Systems
基金 国家“八六三”高技术研究发展计划基金项目(2006AA01Z449)资助
关键词 污点分析 控制流 数据流 脆弱性 taint analysis control flow dataflow vulnerability
  • 相关文献

参考文献11

  • 1John Viega, Bloeh J T. ITS4 :a static vulnerability scanner for C and C++ code[C]: Annual Computer Security Applications Conference, December 2000.
  • 2Wagner D, Foster J, Brewer E, et al. A first step towards automated detection of buffer overrun vulnerabilities[C]. Network and Distributed Systems Security Conference, San Diego, CA, February 2000.
  • 3Chen H, Wagner D. MOPS: an infrastructure for examining security properties of software[C]. Proc. 9th ACM Conf. Computer and Communications Security (CCS2002), ACM Press, 2002,235-244.
  • 4Newsome J, Song D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software[C]. 12th Annual Network and Distributed System Security Symposium, Feb. 2005.
  • 5Cheng W, Zhao Q, Yu B, et al. Taint trace: efficient flow tracing with dynamic binary rewriting[C]. Proocedings of the 11th IEEE Symposium on Computers and Communications, June, 2006.
  • 6Cqual [EB/OL]. http://www, cs. umd. edu/- jfoster/cqual/. August 2007.
  • 7Zhang X, Edwards A, Jaeger T. Using CQUAL for static analysis of authorization hook placement [C]. Proceedings of the Eleventh Usenix Security Symposium, August 2002.
  • 8Oink [EB/OL ]. http://www. eubewano. org/oink. August 2007.
  • 9Jeffrey S Foster. Type qualifiers: lightweight specifications to improve software quality[D]. University of California, Berkeley, December 2002.
  • 10Umesh Shankar, Kunal Talwar, Jeffrey S Foster, et al. Detecting format-string vulnerabilities with type qualifiers [C]. 10th USENIX Security Symposium, August 2001.

同被引文献56

  • 1吴世忠.信息安全漏洞分析回顾与展望[J].清华大学学报(自然科学版),2009(S2):2065-2072. 被引量:22
  • 2曾鸣,赵荣彩,姚京松,王小芹.基于特征提取的二进制代码比较技术[J].计算机工程与应用,2006,42(22):8-11. 被引量:6
  • 3NIST.information Technology Portal[EB/OL]. http://www.nist.gov/ index.html, 2011-07-18.
  • 4Chris Wysopal, Chris Eng. Static Detection of Application Backdoors[M].
  • 5赵卓.常用Java静态代码分析工具的分析与比较[EB/OL].http://www.ibm.com/developerworks/cn/java/j-lo-statictest-tools/.2012-5-31.
  • 6John Viega,JT Bloch,Tadayoshi Kohno, Gary McGraw. ITS4: A static vulnerability scanner for C and CI--I- code[C]. In Proceedings of the 16th Annual Computer Security Applications Conference, December 2000.
  • 7Brian Chess,Jacob West.安全编程代码静态分析[M].北京:机械工业出版社.2008.
  • 8IDC. Android marks fourth anniversary since launch with 75.0% market share in third quarter, according to IDC EEB/OL]. (2012-11-01) [2013-01-02]. http:// www. idc. com/getdoc, j sp ? containerld = prUS23771812.
  • 9Enck W, Ongtang M, McDaniel P. On lightweight mo- bile phone application certification [ C ]//Proceedings of the 16th ACM Conference on Computer and Communi- cations Security. Chicago, IL, USA, 2009:235 -245.
  • 10Zhou Yajin, Wang Zhi, Zhou Wu, et al. Hey, you, get off of my market: detecting malicious apps in offi- cial and alternative Android markets[C ]//Proc of the 19th Annual Network and Distributed System Security Symposium. San Diego, CA, USA: 2012:1-13.

引证文献12

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部