期刊文献+

一种基于指针逻辑的代码安全属性分析方法 被引量:3

A New Property Verification Method for Code Security Based on Pointer Logic
下载PDF
导出
摘要 在分析和总结前人工作的基础上,提出了一种改进的代码安全属性验证方法.该方法在利用传统的源代码安全属性验证工具的基础上,加入了指针逻辑,针对现有代码属性分析技术只能对C语言子集进行分析验证的不足,利用指针逻辑对源代码的分析结果对源代码中的指针进行替换,从而避开了传统静态代码属性验证工具对指针处理功能太弱的瓶颈,可以实现对C语言中的部分指针及运算进行处理. This paper proposes an improved verification method for code security property on the basis of the study of predecessors' work. According to the situation that current code property verification can only deal with a subset of C programming language, this paper introduces the pointer logic, whose result can be used by the replacement algorithm to substitute all the pointers in the source code, to the conventional code security property verification tools. The proposed ap- proach avoids the weakness of pointer processing in the traditional static code property verification, and therefore can handle pointers in C programming language when property verification partially.
作者 张阳 程亮
出处 《计算机学报》 EI CSCD 北大核心 2009年第6期1119-1125,共7页 Chinese Journal of Computers
基金 国家"八六三"高技术研究发展计划项目基金(2007AA01Z465 2006AA01Z433 2007AA01Z414)资助~~
关键词 操作系统安全 形式化验证 代码分析 模型检测 指针逻辑 operating system security formal verification code analysis model checking pointer logic
  • 相关文献

参考文献16

  • 1Clarke Edmund M, Grumberg Orna, Peled Doron A. Model Checking. Massachusetts: The MIT Press, 1999
  • 2Nipkow T, Paulson L. Isabelle/HOL-A proof assistant for higher-order logic//Lecture Notes in Computer Science 2283. Springer, 2008
  • 3Cruz Jorge. Constraint Reasoning for Differential Models. Amsterdam~ The IOS Press, 2005
  • 4Weiβenbacher Georg. An abstraction/refinement scheme for model checking C programs [M. S. dissertation]. Technischen Universitat Graz, Graz, Austria, 2003
  • 5Henzinger T A, Jhala R, Majumdar R, Necula G C, Sutre G, Weimer W. Temporal-safety proofs for systems code// Proceedings of the 14th International Conference on Computer-Aided Verification (CAV). Copenhagen, Denmark, 2002 : 526- 538
  • 6Clarke M, Kroening D, Sharygina N, Yorav K. SATABS: SAT-based predicate abstraction for ANSI-C//Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2005). Edinburgh, U. K. , 2005: 570-574
  • 7Flanagan C, Leino K R M, Lillibridge M, Nelson G, Saxe J B, Stata R. Extended static checking for java//Proceedings of the ACM SIGPLAN2002 Conference on Programming Language Design and Implementation (PLDI' 2002). Berlin, Germany, 2002:234- 245
  • 8Barnett M, Leino K R M, Schulte W, The Spec# programming system: An overview//Proceedings of the CASSIS'04. Marseille, France, 2005:49-69
  • 9Filliatre J C, Marche C. Multi-prover verification of C pro- grams//Proceedings of the ICFEM. Seattle, USA, 2004: 15-29
  • 10Blazy Sandrine, Dargaye Zaynah, Leroy Xavier. Formal veri fication of a C compiler front-end//Proeeedings of the Sympo slum on Formal Methods (FM' 06). Hamilton, Canada 2006: 460-475

二级参考文献37

  • 1Morrisett G, Walker D, Crary K, Glew N. From system F to typed assembly language//Proceedings of the 25th ACM Symposium on Principles of Programming Languages. San Diego, 1998:85-97
  • 2Mandelbaum Y, Walker D, Harper R. An effective theory of type refinements//Proceedings of the 8th International Conference on Functional Programming. Uppsala, Sweden, 2003: 213-225
  • 3Necula G. Proof-carrying code//Proceedings of the 24th ACM Symposium On Principles of Programming Languages. New York, 1997:106-119
  • 4Appel A W. Foundational proof-carrying code//Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science. Baston, Massachusetts, USA, 2001:247-258
  • 5Yu D, Hamid N A, Shao Z. Building certified libraries for PCC: Dynamic storage allocation. Science of Computer Programming, 2004, 50(1-3):101 127
  • 6Feng X, Shao Z, Vaynberg A, Xiang S, Ni Z. Modular Verification of Assembly Code with Stack-Based Control Abstractions//Proceedings of the 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation. Ottawa, Canada, 2006:401-414
  • 7Xi H. Applied type system: Extended abstract//Proceedings of TYPES 2003. LNCS 3085. Springer-Verlag, 2004: 394- 408
  • 8Steensgaard B. Points to analysis in almost linear time//Proceedings of the 23th Annual ACM Symposium on Principles of Programming Languages. Florida, USA, 1996:32-41
  • 9Berndl M, Lhotak O, Qian F, Hendren L, Umanee N. Points-to analysis using BDDs//Proceedlngs of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation. San Diego, 2003 :103-114
  • 10Hind M. Pointer analysis: Haven't we solved this problem yet? //Proceedings of the ACM Workshop on Program Analysis for Software. Tools and Engineering. Snowbird, Utab, USA, 2001:54-61

共引文献23

同被引文献34

  • 1EDMUND M.CLARKE,ORNA GRUMBERG,DORON A.Pe- led.Model Checking[M].Massachusetts:The MIT Press,1999.
  • 2NIPKOW T.,PAULSON L..Isabelle/HOL--A Proof Assis- tant for Higher-Order Logic[M].New York:Springer, c2002.
  • 3CRUZ JORGE.Constraint Reasoning for Differential Models [M].The IOS Press,2005.
  • 4WEIBENBACHER GEORG.An Abstraction/Refinement S- cheme for Model Checking C Programs [D].Technischen Universital Graz,Master's thesis,2003.
  • 5RICHARD M.STALLMAN.GNU Compiler Collection Inter- nals for GCC3.3[C].January 2002:101-141.
  • 6J.VIEGA,JT.BLOCH,Y.KOHNO,et al.A Static Vulnerability Sca-nner for C and C++ Code[J].In Proceedings of the 16th, Annual Computer Security Applications Conference(ACSAC 2000).IEEE,2000.
  • 7DAVID EVANS, DAVID LAROCHELLE.Improving Secu- rity Using Extensible Lightweight Static Analysis [J].IEEE Software,Jan./Feb.2002.
  • 8VON RIEGEN M, HUSEMANN, FINK S, et al. Rule-based coordination of distributed Web service transactions[J]. IEEE Transactions on Services Computing, 2010, 3(1): 60-72.
  • 9WARAWOOT P, TOSHIAKI A, ATHASIT S, et al. Conformance verification between Web service choreography and implementation using learning and model checking[C]//2011 IEEE 9th International Conference on Web Services. Hawaii, USA: IEEE, 2011: 722-723.
  • 10SYLVAIN H, ROGER V, OMAR C. Specifying and validating data-aware temporal Web service properties[J]. IEEE Transactions on Software Engineering, 2009, 35(5): 669-683.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部