期刊文献+

基于TEMU的进程间通信过程逆向 被引量:1

Reversing of inter-process communication based on TEMU
下载PDF
导出
摘要 传统的逆向分析方法在分析多进程架构软件时具有较多难以克服的困难,针对这个问题提出了基于TEMU的进程间通信过程逆向方法。利用动态二进制分析平台TEMU记录多进程程序函数调用信息,结合进程间通信函数的关联规则从函数调用信息中提取进程间通信的通信方法、通信数据和通信协作机制。根据该方法设计并实现了一个原型系统,对多款多进程架构软件进行测试,测试结果表明,该方法能够准确提取多进程架构软件的进程间通信过程,对多进程架构软件逆向起到了很大的辅助作用。 Due to some difficulty in analysis of multi-process software with custom reverse method,this paper presented the reversing of inter-process communication based on TEMU.Record functions called information in multi-process software with dynamic binary analysis platform TEMU,combined with functions correlation to extract the method,data and mechanism of inter-process communication.This paper designed and realized a model,and tested it with several multi-process software.The results show that this method can extract inter-process communication procedure correct,plays an important role in reversing of multi-process software.
作者 焦永生 舒辉
出处 《计算机应用研究》 CSCD 北大核心 2013年第7期2091-2095,共5页 Application Research of Computers
关键词 进程间通信 动态二进制分析 软件逆向 函数关联 inter-process communication dynamic binary analysis software reverse functions correlation
  • 相关文献

参考文献10

  • 1邓超国,谷大武,李卷孺,孙明.一种基于全系统仿真和指令流分析的二进制代码分析方法[J].计算机应用研究,2011,28(4):1437-1441. 被引量:4
  • 2YIN Heng,SONG D. TEMU:binary code analysis via wholesystem layered annotative execution,UCB/EECS-2010-3[R].California:U-niversity of California,2010.
  • 3REIS C,GRIBBLE S D. Isolating Web programs in modern browser architectures[A].New York:acm Press,2009.219-232.
  • 4BELLARD F. QEMU,a fast and portable dynamic translator[OL].http://static.usenix.org/e-vents/usen-ixO5/tech/freenix/full_papers/bellard/bellard_html/,2012.
  • 5SONG D,BRUMLEY D,CABALLERO J. BitBlaze:a new approach to computer security via binary analysis[A].2008.1-25.
  • 6LUK C K,COHN R,MUTH R. Pin:building customized program analysis tools with dynamic instrumentation[A].New York:acm Press,2005.190-200.
  • 7BRUENING D L. Efficient,transparent,and comprehensive runtime code manipulation[D].Cambridge:Massachusetts Institute of Technology,2004.
  • 8NETHERCOTE N.Dynamic binary analysis and instrumentation[D]剑桥:剑桥大学,2004.
  • 9梁升荣,范明钰,王光卫,郑秀林.一种新的内核级Rootkit的检测方法[J].计算机应用研究,2009,26(8):3047-3049. 被引量:7
  • 10CHARNEY M. XED2 user guide[OL].http://www.cs.virginia.edu/kim/publicity/pin/docs/20751/Xed/html/main.html,2012.

二级参考文献20

  • 1颜仁仲,钟锡昌,张倪.一种自动检测内核级Rootkit并恢复系统的方法[J].计算机工程,2006,32(10):77-79. 被引量:12
  • 2冯万利.基于内核入侵的木马设计与实现[J].微计算机信息,2006,22(06X):120-122. 被引量:8
  • 3胡秋卫,薛质.检测内核级rootkit的新方法[J].信息安全与通信保密,2007,29(1):131-133. 被引量:2
  • 4罗粮,周熙.RootKit在Linux下的工作原理及其检测[J].计算机安全,2007(3):19-21. 被引量:3
  • 5段钢.加密与解密[M].3版.北京:电子工业出版社,2006 1-5.
  • 6Bochs: the open source [A-32 emulation project[ EB/OL]. http:// bochs, sourceforge, net/.
  • 7邓超国,谷大武,胡维奇一种基于动态指令流的恶意程序检测方法[C]//全国计算机安全学术交流会论文集,第二十五卷.合肥:中国科学技术大学出版社,20lO:173-179.
  • 8SONG D, BRUMLEY D, YIN H, et al. BitBlaze: a new approach to computer security via binary analysis [ C ]//Proc of the 4th International Conference on Information Systems Security. Berlin: Springer, 2008,1 -25.
  • 9IDIKA N, MATHUR A P. A survey of malware detection techniques[ C]//Proc of Software Engineering Research Center Conference. 2007.
  • 10FILIOL E. Malware pattern scanning schemes secure against black-box analysis[J]. Journal in Computer Virology,2006,2( 1 ) :35-50.

共引文献9

同被引文献13

  • 1刘絮颖.反编译中控制流重构与控制结构恢复技术研究[D].郑州:信息工程大学,2010.
  • 2Jean Louis Boulanger.Static analysis of software:The abstract interpretation[M].Hoboken:Wiley Press,2013.
  • 3Patrick Cousot,Radhia Cousot.Abstract interpretation:a unified lattice model for static analysis of programs by construction or approximation of fixpoints[C]//Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on principles of programming languages,Los Angeles,California,1977:238-252.
  • 4Heng Yin,Dawn Song.TEMU:Binary Code Analysis via Whole-System Layered Annotative Execution[EB/OL].(2012-10-11).[2014-09-11].http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-3.html.
  • 5XML可扩展标记语言[EB/OL].(2014-08-20).[2014-09-11].http://zh.wikipedia.org/zh-cn/XML.
  • 6Dot language[EB/OL].(2014-09-11).[2014-09-11].http://www.graphviz.org/content/dot-language.
  • 7David Brumley,Ivan Jager,Thanassis Avgerinos,et al.BAP:A Binary Analysis Platform[C]//Proceedings of the conference on computer aided verification,2011:1-7.
  • 8IDA:About[EB/OL].(2014-01-25).[2014-09-11].https://www.hex-rays.com/products/ida/index.shtml.
  • 9QEMU Internals[EB/OL].(2014-08-01).[2014-09-11].http://qemu.weilnetz.de/qemu-tech.html.
  • 10Dawn Song,David Brumley,Heng Yin,et al.Bit Blaze:A New Approach to Computer Security via Binary Analysis[C]//Proceedings of the 4th international conference on information systems security,Hyderabad,India,2008:1-25.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部