期刊文献+

执行路径建模进程化代码分析 被引量:1

Code Analysis of Modeling Execution Path as Process
下载PDF
导出
摘要 针对符号执行分析方法路径资源消耗过大的问题,提出执行路径建模进程化的过程内分析优化方法。结合基于惰性初始化的对象建模方法,以Phoenix编译器中间表示层的代码作为直接分析对象,实现一个检测C代码漏洞的工具原型。使用该工具验证了Openssl和Apache软件的已知漏洞代码,并在wget的1.11.4版本中发现一个"拒绝服务"漏洞。 Aiming at the problem that the resource consumption of symbolic execution is too large,this paper proposes an intra-procedural analysis method which is named modeling execution path as process,and combines using the method of modeling objects which is named lazy initialization.A tool prototype which can detect the vulnerability of C code is implemented,and analyzes the Intermediate Rresent(IR) of Phoenix as the direct object.Some known vulnerabilities of Openssl and Apache are verified,and a DOS vulnerability of the version 1.11.4 of wget is detected.
作者 林锦滨 蒋凡
出处 《计算机工程》 CAS CSCD 北大核心 2010年第9期68-69,72,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2009AA01Z145)
关键词 符号执行 静态分析 C代码 漏洞检测 symbolic execution static analysis C code vulnerability detection
  • 相关文献

参考文献4

  • 1Cadar C,Engler D.Execution Generated Test Cases:How to Make Systems Code Crash Itself[C]//Proc.of the 12th International SPIN Workshop on Model Checking Software.San Francisco,CA,USA:[s.n.],2005.
  • 2Xie Tao,Marinov D,Schulte W.Symstra:A Framework for Generating Object-oriented Unit Tests Using Symbolic Execution[C]//Proc.of the 11th International Conference on Tools and Algorithms for the Construction and Analysis of Systems.Edinburgh,UK:[s.n.],2005.
  • 3Microsoft.Phoenix[Z].[2009-08-01].http://connect.microsoft.com/ Phoenix.
  • 4Visser W,Pasareanu C S,Khurshid S.Test Input Generation with Java PathFinder[C]//Proc.of ISSTA'04.Boston,MA,USA:[s.n.],2004.

同被引文献4

  • 1Kim Sunghun,Pan Kai,James E E,et al.Memories of Bug Fixes[C] //Proc.of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering.[S.l.] :ACM Press,2006.
  • 2Livshits B,Zimmermann T.DynaMine:Finding Common Error Patterns by Mining Software Revision Histories[C] //Proc.of 2005 European Software Engineering Conference and Foundations of Software Engineering.Lisbon,Portugal:[s.n.] ,2005.
  • 3Williams C C,Hollingsworth J K.Automatic Mining of Source Code Repositories to Improve Bug Finding Techniques[J].IEEE Trans.on Software Engineering,2005,31 (6):466-480.
  • 4Horwitz S.Identifying the Semantic and Textual Differences Between Two Versions of a Program[J].ACM SIGPLAN Notices,1990,25(6):234-245.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部