期刊文献+

一种基于细粒度污点分析的逆向平台 被引量:2

CHEN Yang.Reverse platform based on fine-grained taint analysis
下载PDF
导出
摘要 分析对比了现有的行为分析系统的优缺点,针对逆向分析过程中所遇到的代码保护技术等困难,研究并改进了指令级的动态污点分析技术。利用虚拟化技术,设计了一套具有通用性的逆向分析平台。研究插件结构实现可扩展性,以适应漏洞挖掘、恶意行为检测等领域的应用。经实验测试,该设计能与常规的逆向手段配合,显著地提高分析的效率。 The advantages and disadvantages of existing behavioral analysis system are analysed. To solve the prob- lems encounted in reverse analysis, such as code protection, instruction-level dynamic taint analysis is studied and improved. Based on virtualization technology, a common reverse analysis platform is designed to provide assistance for fields such as fuzzing and malicious-code detection. Plug-in feature is supported to provide extendibility. The ex- perimental results prove that with conventional means of reverse analysis, the proposed method can significantly improve the analysis efficiency.
出处 《计算机工程与应用》 CSCD 2012年第28期90-96,共7页 Computer Engineering and Applications
基金 郑州市科技创新团队项目(No.10CXTD150)
关键词 虚拟化 污点分析 逆向分析 virtualization taint analysis reverse analysis
  • 相关文献

参考文献9

  • 1Kruegel C,Robertson W,Valeur F,et al.Static disassembly of obfuscated binaries[M].Santa Barbara, CA, USA: Reliable Software Group,2004.
  • 2Rolles R.Unpacking virtualization obfuscators[EB/OL]. (2009).http://usenix.org/.
  • 3刘涛涛.扭曲加密变换技术[R].软件安全峰会,2008.
  • 4Nicolas Falliere Fahrenheit(译).Windows反调试技术参考[J].黑客防线,2007(11):62-67. 被引量:1
  • 5Newsome J, Song D.Dynamic taint analysis for automatic detection, analysis and signature generation of exploitson commodity software[D].Pittsburgh: Carnegie Mellon University, School of Computer Science, 2005.
  • 6Miller C, Caballero J, Johnson N M.Crash analysis using BitBlaze[C]//Black Hat USA 2010,2010.
  • 7Sekar R.An efficient black-box technique for defeating web application attacks[C]//Network and Distributed System Syrnposium(NDSS 2009),2009.
  • 8黄强,曾庆凯.基于信息流策略的污点传播分析及动态验证[J].软件学报,2011,22(9):2036-2048. 被引量:21
  • 9Nethercote N.Dynamic binary analysis and instrumentation or building tools is easy[D].University of Cambridge, 2004.

二级参考文献28

  • 1Vcnkataramani G, Doudalis I, Solihin Y, Prvulovic M. FlexiTaint: A programmable accelerator for dynamic taint propagation. In: Carter J, ed. Proc. of the 14th Int'l Syrup. on High Performance Computer Architecture (HPCA). New York: ACM Press, 2008. 173-184. Idol: 10.1109/HPCA.2008.46S8637].
  • 2Newsome J, Song D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Harder E, ed. Prec. of the Network and Distributed System Security Syrup. (NDSS 2005). San Diego: National Security Agency Press, 2005. 187-204.
  • 3CVE terminology page. 2009. http://www.cve.mitre.org/about/terminology.html#vulnerability.
  • 4Sekar R. An efficient black-box technique for defeating Web application attacks. In: Vigna G, ed. Proc. of the Network and Distributed System Security Syrup. (NDSS 2009). San Diego: National Security Agency Press, 2009.23-39.
  • 5CVE and CCE statistics query page. 2009. http://web.nvd.nist.gov/view/vuln/statistics?execution=e 1 s 1.
  • 6Open Web Application Security Project (OWASP). The ten most critical Web application security vulnerabilities. 2007. http://www.owasp.org/images/e/e8/OWASP_ Top_ 10 _2007.pdf.
  • 7Lam MS, Martin MC, Livshits VB, Whaley J. Securing Web applications with static and dynamic information flow tracking. In: Hatcliff J, ed. Proc. of the 2008 ACM SIGPLAN Symp. on Partial Evaluation and Semantics-based Program Manipulation. New York: ACM Press, 2008.3-12. [doi: 10.1145/1328408.1328410].
  • 8Xie YC, Chou A, Engler D. ARCHER: Using symbolic, path-sensitive analysis to detect memory access errors. In: Paakki J, ed. Proc. of the 9th European Software Engineering Conf. Held Jointly with 1 lth ACM SIGSOFT Int'l Symp. on Foundations of Software Engineering. New York: ACM Press, 2003. 327-336. [doi: 10.1145/940071.940115].
  • 9Yin H, Song D, Egele M, Kruegel C, Kirda E. Panorama: Capturing system-wide information flow for malware detection and analysis. In: Ning P, ed. Proc. of the 14th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2004. 116-127. [doi: 10.1145/1315245.1315261].
  • 10Sabelfeld A, Myers AC. Language-Based information-flow security. IEEE Journal on Selected Areas in Communications, 2003, 21(1):5-19. [doi: 10.1109/JSAC.2002.806121].

共引文献20

同被引文献11

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部