期刊文献+

ClearBug 一种改进的自动化漏洞分析工具 被引量:1

ClearBug An improved automatic tool for bug analysis
下载PDF
导出
摘要 随着软件漏洞的危害性不断增强,软件漏洞分析已经成为了国内外安全研究的热点。已有的工作大致可以分为静态分析和动态分析两类。本文在开源的软件漏洞静态分析工具BugScam的基础上,提出了一种建立漏洞模型,映射漏洞模型为分析程序,并进行漏洞分析的思路。对于大量的软件漏洞,我们提出,将其分为函数漏洞和逻辑漏洞两类,并分别探讨了两种模型与程序之间的对应关系。最后,对我们编写的一个改进的自动化漏洞分析工具ClearBug进行了介绍,并用实验验证了模型与程序的正确性和有效性。 With the increasing harmfulness of software vulnerability, identifying potential vulnerabilities in software has become the focus of security research. The current analysis method can be roughly divided into two categories: static analysis and dynamic analysis. This paper presents an idea based on open source static analysis tool BugScam. First, set up vulnerability model. Then, map the model to program and begin vulnerability analysis. We classified vulnerability model to function model and logic model and research the corresponding relationship between model and program. Finally, we give an introduction of our improved automatic vulnerability analysis tool ClearBug. The experiment results show that our tool can effectively find out some software vulnerability.
出处 《信息网络安全》 2009年第5期28-31,共4页 Netinfo Security
关键词 漏洞模型 自动化分析 ClearBug Software Vulnerability Model Automatic Analysis ClearBug
  • 相关文献

参考文献2

二级参考文献10

  • 1王前,余静,陈性元,谢寿生.安全隐患检测系统的设计与实现[J].微计算机信息,2005,21(10X):3-4. 被引量:5
  • 2[1]Larry Rogerst.Buffer Overflow-What Are They and What Can I Do Them?[EB/OL].http:∥www.cert .org/homeusers/buffer_overflow.html,2003
  • 3[2]David Evans,David Larochelle.Improving Security Using Extensible Lightweight Static Analysis[J].IEEE Software,2002
  • 4[3]David Evans. Splint Manual[EB/OL].http:∥www.splint.org/manual,2003
  • 5[4]Nurit Dor,Michael Rodeh,Mooly Sagiv. Cleanness Checking of String Manipulations in C Programs via Integer Analysis[C].In:Proceeding of the 8th Symposium on Static Analysis,2001
  • 6[5]David Wanger,Jeffery S Foster,Eric A Brewer et al.A First Step Toward Authomated Detection of Buffer Overrun Vulnerabilities[C].In:the Network and distributed system security symposium,2000-02
  • 7[6]GCC Command options[EB/OL].http:∥gcc.gnu.org/onlinedocs/gcc3.04/gcc_3 .html, 2003
  • 8M. Rekoff. On reverse engineering [J].IEEE Transactions on Systems, Man and Cybernetics, 1955; 15(2):244-252
  • 9Greg Hoglund.软件剖析-代码攻防之道[M].北京:清华大学出版社,2005
  • 10Halvar Flake. Structural Comparison of Executable Objects[J].DIMVA 2004:161-173

共引文献18

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部