期刊文献+

基于输入触发的漏洞挖掘模型 被引量:2

Disclosure model based on input-triggering vulnerability
下载PDF
导出
摘要 为了解决目前Fuzzing挖掘技术存在的挖掘算法移植性差、挖掘点不易修改和挖掘程度难以度量等不足,在分析当前程序输入数据特点和程序状态特点的基础上,总结出程序状态变化和程序处理输入数据的特点,设计了基于输入触发的漏洞挖掘模型。通过建立目标系统的程序状态、输入点和输入数据的模型来建立挖掘过程以及生成测试数据,实验结果表明,该模型能够解决上述Fuzzing技术的不足,还表明了基于输入触发的漏洞挖掘模型可行性和有效性。 Fuzzing discloses lots of faults of itself in vulnerability disclosure field such as poor transplantablity, poor changeability of disclosure point and poor measurability on disclosure degree at present. On the basis of analyzing the characteristic of the input data of programs and the running state of a programs, the rules of the transition of programs' states and the rules of programs in processing data from input are educed, and then the based on input-triggering vulnerability disclosure model is designed to solve the problem mentioned above. The model create procedure of vulnerability disclosure and produce testing data by building the model of programs' state, the model of interface of input and the model of data from input. Then a demo experiment validate that the model can solve the problem, that proves the feasibility and validity of the model.
作者 郑亮
出处 《计算机工程与设计》 CSCD 北大核心 2009年第18期4227-4230,共4页 Computer Engineering and Design
关键词 漏洞挖掘 FUZZING技术 软件测试 输入触发 形式化 vulnerability disclosure Fuzzing soffwaretesting input-triggering formalization
  • 相关文献

参考文献20

  • 1Michael Sutton, Adam Greene, Pedram Amini.Brute force vulnerability diseovery[M].Addison-Wesley,2007.
  • 2Jonathan Afek.Dangling pointer[EB/OL].https://www.blackhat. com/presentations/bh-usa-07/Afek/Whitepaper/bh-usa-07-afek- WP.pdf.
  • 3Pedram Amini, Aaron Portnoy.Fuzzing sucks! [EB/OL] .https:// www.blackhat.com/presentations/bh-usa-07/Amini and Port- noy/Whitepaper/bh-usa-07-amini_and_portnoy-WP.pdf.
  • 4Yuriy Bulygin.Remote and local exploitation of network drivers [EB/OL] .https://www.blackhat.com/presentations/bh-usa-07/ Bulygin/Whitepaper/bh-usa-07-bulygin-WP.pdf.
  • 5Jon Callas,Raven Alder, Riccardo Bettati,et al.Traffic analysis-- the moat powerful and least understood attack methods[EB/OL]. https://www.blaeldaat.com/presentations/bh-usa-07/Cailas_Al_der Bettati and Matthewson/PresentationPoh-usa-07-callas_alder_bettati_matthewson.pdf.
  • 6Stephan Chenette,Moti Joseph.Web browser heap spray attacks [EB/OL] .https://www.blackhat.com/presentations/bh-usa-07/ Chenette and Joseph/Presentation/bh-usa-07-chenette and joseph.pdf.
  • 7Charlie Miller. Hacking leopard: Tools and techniques for attacking the newest Mac OS X[EB/OL].https://www.blackhat.com/ presentations/bh-usa-07/Miller/hitepaper/bh-usa-07-miller-WP.pdf.
  • 8Scott Stender.Blind security testings-an evolutionary approach [EB/OL] .https://www.blackhat.com/presentations/bh-usa-07/ Stender/Whitepaper/bh-usa-07 -stender-WP.pdf.
  • 9David Thiel.Exposing vulnerabilities in media software[EB/OL]. https://www.blackhat.com/presentations/bh-usa-07/Thiell Whitepaper/bh-usa-07-thiel-WP.pdf.
  • 10Laurent Butti. Wi-Fi advanced fuzzing [EB/OL] .https:// www.blackhat.com/presentations/bh-europe-07/Butti/Whitepa- per/bh-eu-07-butti-handouts-apr 19.pdf.

同被引文献24

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部