期刊文献+

基于信息流策略的污点传播分析及动态验证 被引量:21

Taint Propagation Analysis and Dynamic Verification with Information Flow Policy
下载PDF
导出
摘要 基于流和上下文敏感的SSA(static single assignment)信息流分析技术,提出了一种细粒度、可扩展的污点传播检测方法.利用控制流和数据流的相关信息,跟踪污染数据及其传播路径,可以检测缓冲区溢出、格式化串漏洞等程序脆弱性.分析过程在潜在问题点自动插装动态验证函数,在无需用户干预的情况下保证了程序的运行时安全.在GCC编译器的基础上实现了分析系统,实验结果表明,该方法具有较高的精确度和时空效率. In this paper, based on a flow and context-sensitive SSA (static single assignment) information-flow analysis, a fine-grained and scalable approach is proposed for taint propagation analysis, which can not only track tainted data and its propagation path with control and data-flow properties, but also detect the vulnerabilities such as buffer overflow and format string bugs successfully. During the analysis, pieces of code considered vulnerable are instrumented with dynamic verification routines, so that runtime security is guaranteed in the absence of user intervention. The analysis system is implemented as an extension of GCC compiler, and the experiments have proven that this approach is efficient, holding both optimized accuracy and time-space cost.
作者 黄强 曾庆凯
出处 《软件学报》 EI CSCD 北大核心 2011年第9期2036-2048,共13页 Journal of Software
基金 国家自然科学基金(60773170,60721002,90818022,61021062) 国家高技术研究发展计划(863)(2006AA01Z432) 高等学校博士学科点专项科研基金(200802840002) 江苏省科技支撑计划(BE2010032) 上海市信息安全综合管理技术研究重点实验室开放课题(AGK2008003)
关键词 脆弱性 信息流 污点传播 动态验证 静态单一赋值 vulnerability information flow taint propagation dynamic verification static single assignment
  • 相关文献

参考文献28

  • 1CVE terminology page. 2009. http://www.cve.mitre.org/about/terminology.html#vulnerability.
  • 2Sekar R. An efficient black-box technique for defeating Web application attacks. In: Vigna G, ed. Proc. of the Network and Distributed System Security Syrup. (NDSS 2009). San Diego: National Security Agency Press, 2009.23-39.
  • 3CVE and CCE statistics query page. 2009. http://web.nvd.nist.gov/view/vuln/statistics?execution=e 1 s 1.
  • 4Open Web Application Security Project (OWASP). The ten most critical Web application security vulnerabilities. 2007. http://www.owasp.org/images/e/e8/OWASP_ Top_ 10 _2007.pdf.
  • 5Lam MS, Martin MC, Livshits VB, Whaley J. Securing Web applications with static and dynamic information flow tracking. In: Hatcliff J, ed. Proc. of the 2008 ACM SIGPLAN Symp. on Partial Evaluation and Semantics-based Program Manipulation. New York: ACM Press, 2008.3-12. [doi: 10.1145/1328408.1328410].
  • 6Xie YC, Chou A, Engler D. ARCHER: Using symbolic, path-sensitive analysis to detect memory access errors. In: Paakki J, ed. Proc. of the 9th European Software Engineering Conf. Held Jointly with 1 lth ACM SIGSOFT Int'l Symp. on Foundations of Software Engineering. New York: ACM Press, 2003. 327-336. [doi: 10.1145/940071.940115].
  • 7Yin H, Song D, Egele M, Kruegel C, Kirda E. Panorama: Capturing system-wide information flow for malware detection and analysis. In: Ning P, ed. Proc. of the 14th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2004. 116-127. [doi: 10.1145/1315245.1315261].
  • 8Sabelfeld A, Myers AC. Language-Based information-flow security. IEEE Journal on Selected Areas in Communications, 2003, 21(1):5-19. [doi: 10.1109/JSAC.2002.806121].
  • 9Denning DE, Denning PJ. Certification of programs for secure information flow. Communications of the ACM, 1977,20(7) 504-513. [doi: 10.1145/359636.359712].
  • 10Goguen JA, Meseguer J. Security policies and security models. In: Proc. of the IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society Press, 1982.11-20. [doi: 10.1109/SP.1982.10014].

同被引文献134

  • 1谭学瑞,邓聚龙.灰色关联分析:多因素统计分析新方法[J].统计研究,1995,12(3):46-48. 被引量:322
  • 2Kruegel C,Robertson W,Valeur F,et al.Static disassembly of obfuscated binaries[M].Santa Barbara, CA, USA: Reliable Software Group,2004.
  • 3Rolles R.Unpacking virtualization obfuscators[EB/OL]. (2009).http://usenix.org/.
  • 4刘涛涛.扭曲加密变换技术[R].软件安全峰会,2008.
  • 5Newsome J, Song D.Dynamic taint analysis for automatic detection, analysis and signature generation of exploitson commodity software[D].Pittsburgh: Carnegie Mellon University, School of Computer Science, 2005.
  • 6Miller C, Caballero J, Johnson N M.Crash analysis using BitBlaze[C]//Black Hat USA 2010,2010.
  • 7Sekar R.An efficient black-box technique for defeating web application attacks[C]//Network and Distributed System Syrnposium(NDSS 2009),2009.
  • 8Nethercote N.Dynamic binary analysis and instrumentation or building tools is easy[D].University of Cambridge, 2004.
  • 9CONDIE T, ALVARO P, HELLERSTEIN J M,et al. MapReduce online{R]. UCB/EECS-2009-136. Berkeley, CA, USA: University of California, Berkeley,2009.
  • 10CHERNIACK M, BALAKRISHNAN H, BALAZINSKA M, et aI.Scalable distributed stream processing[C]//Proceedings of the 1st Biennial Conference on Innovative Data Systems Research (CIDR '03),Jan 5-8,2003, Asilomar, CA, USA. New York,NY, USA: ACM 2003:12p.

引证文献21

二级引证文献138

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部