期刊文献+

基于XML的面向二进制漏洞模式形式化描述研究 被引量:1

Research on Formal Description of Binary-Executable-Oriented Vulnerability Pattern based on XML
下载PDF
导出
摘要 研究人员通过深入分析大量已公开漏洞的触发成因,将存在安全缺陷的代码抽象为漏洞模式。二进制静态漏洞挖掘技术的核心思想,就是在对二进制程序反汇编得到汇编代码的基础上,以漏洞模式为指导进行安全缺陷检测。文章对缓冲区溢出漏洞、数组越界漏洞、写污点值到污点地址漏洞模式进行了总结,并使用XML对漏洞模式作了形式化描述。 Researchers define as vulnerability pattern is a general feature of codes that contain security defect through deeply analyzing a mass of public known vulnerabilities'underlying cause.The essence of static detection of vulnerability in binary program is detecting the security defects under the guidance of vulnerability pattern on the basis of disassembling.This paper summerise the pattern of buffer overflow vulnerability,arry overrun vulnerability and writing tainted value to tainted address vulnerability,then makes a description of every vulnerability pattern in XML.
出处 《信息网络安全》 2012年第12期21-24,共4页 Netinfo Security
基金 国家自然科学基金资助项目[61170268 61272493]
关键词 二进制 静态漏洞挖掘 漏洞模式 XML binary static detection of vulnerability vulnerability pattern XML
  • 相关文献

参考文献4

二级参考文献27

  • 1Russinovich M E, Solomon D. Microsoft Windows Internals, fourth edition: Microsoft Windows ServerTM 2003, Windows XP, and Windows 2000 [M]. Washington: Microsoft Press, 2004:540-550.
  • 2Cousot P, Cousot R. Abstract interpretation: A unified lattice model /or static analysis of programs by construction or approximation of fixpoints [C] //Proc of the 4th ACM SIGACT-SIGPLAN Symp on Principles of Programming Languages (POPL). New York: ACM, 1977: 238-252.
  • 3Shankar U, Talwar K, Foster J S, et al. Detecting format string vulnerabilities with type qualifiers [C] //Proc of the 10th USENIX Security Symp. Berkeley: USENIX, 2001: No 16.
  • 4Foster J S, Terauchi T, Aiken A. Flow sensitive type qualifiers [C] //Proc of the ACM SIGPLAN'02 Conf on Programming Language Design and Implementation (PLDI). New York: ACM, 2002: 1-12.
  • 5Foster J S, Fahndrich M, Aiken A. A theory of type qualifiers [C] //Proe of the ACM SIGPLAN'99 Conf on Programming Language Design and Implementation (PLDI). New York: ACM, 1999:192-203.
  • 6Ceara D. Deteeting software vulnerahilities static taint analysis [D]. Bucharest, Romania: Politehnica University of Bucharest, 2009.
  • 7Jovanovic N, Kruegel C, Kirda E. Pixy: A static analysis tool for detecting Web application vulnerabilities [C] //Proe of the 2006 IEEE Symp on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 2006: 263-268.
  • 8Cifuentes C, Scholz B. Parfait: Designing a scalable bug checker [C]//Proc of the 2008 Workshop on Static Analysis. New York: ACM, 2008, 4-11.
  • 9Scholz B, Zhang Chenyi, Cifuentes C. User-Input dependence analysis via graph reachability, SMLI TR-2008- 171 [R]. Menlo Park, CA.. Sun Microsystems Laboratories, 2008.
  • 10Newsome J, Song D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software [C] //Proc of the 12th Annual Network and Distributed System Security Symposium. San Diego, CA: Internet Society, 2005:134-150.

共引文献23

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部