期刊文献+

一种虚拟化环境的脆弱性检测方法

A VULNERABILITY DETECTION METHOD IN VIRTUAL ENVIRONMENT
下载PDF
导出
摘要 基于源代码的静态分析技术是检测软件脆弱性的重要手段之一。针对Linux平台下由不安全方式创建临时文件问题引起的符号链接脆弱性,提出一种基于污点传播分析的脆弱性检测方法。通过查找打开或创建文件等导致脆弱性的特征函数从源代码中识别漏洞触发变量,采用后向污点传播分析方法分析变量传递路径,判断其是否来源于污点源,从而检测出可能存在符号链接脆弱性。利用该方法对XEN 3.03版本的源代码进行检测,成功发现了2个漏洞,其中包括1个未知漏洞。实验表明,该方法是一种有效的脆弱性检测方法。 Source code-based static analysis technology is one of an important means to detect software vulnerabilities.To cope with the problem of unsafe creation of temporary file on Linux platform leading to vulnerabilities in symbol link,a vulnerability detection method based on tainting analysis is proposed.The method recognises the trigger variable of bugs from source code by checking characteristic function of the file open or creation which lead to vulnerabilities,and uses backward tainting analysis method to analyse the variable transition path,and judge whether it comes from the taint data source,so as to find the symbol link vulnerability possibly existing.With this method 2 vulnerabilities have been found in the source code of XEN 3.03,including an unknown vulnerability.The results of experiment show that the method is an effective vulnerability analysis method.
出处 《计算机应用与软件》 CSCD 北大核心 2012年第9期14-17,53,共5页 Computer Applications and Software
基金 国家自然科学基金项目(61100226) 国家高技术研究发展计划项目(2011AA01A203) 北京市自然科学基金项目(4122085) 公安部三所开放基金课题(C10606)
关键词 虚拟化环境 符号链接 污点传播分析 Virtual environment, Symbol link ,Tainting analysis
  • 相关文献

参考文献15

  • 1National VulneYabity Database[ DB/OL]. http ://nvd. nlst. gov.
  • 2Xen Hypervisor[ EB/OL]. http ://xen. org/products/xenhyp, html.
  • 3Terry Bruce Gillette. A Unique Examination of the Buffer Overflow Con- dition[ D]. Florida Institute of Technology, 2002.
  • 4John Viega, Bloch J T, Tadayoshi Kohno. ITS4: A Static Vulnerability Scanner for C and C + + Code [ C]//Annual Computer Security Appli- cations Conference,2000.
  • 5Pozza 1), Sisto R. Compa'ing Lexical Analysis Tools for Buffer Overflow Detection in Network Software[ C ]//CO]VISWARE, 2006 : 1 - 7.
  • 6David Evans, John Guttag, James Homing, et al. LCLint: A Tool for Using Speci? cations to Cheek Code [ C ]//SIGSOFT Symposium on me Foundation of Soflware Engineering, December 1994.
  • 7Barker C. Static Error checking of C Application Ported from UNIX to WIN32 system Using LCLint[ R], Dept. Computer Science, University of Virginia Charlotcesville,2001.
  • 8David Evans. Splint Manual [ M/OL]. 2003. http ://www. slpint, org/ manual.
  • 9Cova M ,Felmetsger V ,Banks G,et al. Static detection of vulnerabilities in x86 executables[ C ]//Proceedings of the Annual Computer Security Applications Conference (ACSAC) , 2006.
  • 10Ghosh A K, OConnor T, McGraw G. Automated approach for identif- ying potential vulnerabilities in software[ C ]//Proceedings of the IEEE Symposium on Security and Privacy, 1998 : 104 - 114.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部