期刊文献+

一种基于CIL静态分析的C#程序缺陷检测方法 被引量:3

CIL Static Analysis Method for C# Program Defect Detection
下载PDF
导出
摘要 通过静态检测发现源程序中的潜在缺陷,可以帮助程序员在软件发布之前发现并修补程序缺陷,提高软件的安全性。提出一种通过静态分析CIL代码来检测C#程序代码缺陷的方法。采用改进的深度优先搜索算法遍历目标程序的控制流程图,结合历史状态缓存机制,能够大幅度提高检测效率;另外,为便于实施别名分析,还提出一种基于内存区域的变量表示方法。基于所述分析方法,开发了一个C#源代码缺陷静态检测系统,并对实际开源项目进行了检测。实验结果表明,本系统能够高效、准确地检测C#程序中常见类型的缺陷。 Finding potential defects by statically detecting source code can help programmers find and fix the defects be- fore the software is released, and thus can improve the security of the software. This paper provided a CIL static analy- sis method to detect defects in C# programs. We adopted an improved depth-first search algorithm to traverse the con- trol flow graph of the target program,and combining with the strategy of caching history states, the performance of the detection can be greatly improved. In addition, to be convenient for alias analysis, we proposed a method based on Mem- ory Region to represent variables. Based on the analysis method described in this paper, we developed a system for de- tecting defects in C# programs. We applied the system on real C# projects,and the detecting result shows that it can detect common kinds of defects in C# programs efficiently and accurately.
出处 《计算机科学》 CSCD 北大核心 2014年第1期220-224,共5页 Computer Science
基金 国家自然科学基金项目(61170240 61070192) 核高基重大专项(2012ZX01039-004)资助
关键词 静态分析 缺陷检测 别名分析 CIL C# Static analysis, Defect detection, Alias analysis, CIL, C #
  • 相关文献

参考文献10

  • 1Aho A V, Lam M S, Ravi S, et al. Compilers: principles, tech- niques, and tools ( 2nd Edition) [M]. Addison-Wesley Profession- al, 2007.
  • 2BlogEngine[OL]. http://www, dotnetblogengine, net/.
  • 3Brian C, Jacob W. Secure programming with static analysis [M]. Addison-Wesley Professional, 2007.
  • 4Alain D. lnterprocedural may-alias analysis for pointers: beyond k-limiting [C]//Proceedings on PLDI. 1994 : 230-241.
  • 5Seth H, Benjamin C, Xie Yi-chen, et al. A system and language for building system-specific, static analyses [C]// Proceedings on PI.DI. 2002 : 69-82.
  • 6Heine D l., Lam M S. A practical flow-sensitive and context-sen-sitive C and C++memory leak detector [C]// Proceedings on PLDI. 2003: 168-181.
  • 7梁彬,侯看看,石文昌,梁朝晖.一种基于安全状态跟踪检查的漏洞静态检测方法[J].计算机学报,2009,32(5):899-909. 被引量:20
  • 8Mono[OL]. http://www, mono-projeet, corn/.
  • 9Main_Page SourceGrid[OL]. http://sourcegrid, codeplex, tom/.
  • 10夏一民,罗军,张民选.基于静态分析的安全漏洞检测技术研究[J].计算机科学,2006,33(10):279-282. 被引量:29

二级参考文献34

  • 1Howard M, LeBlanc D, Viega J. 19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them. USA.. McGraw-Hill Osborne Media, 2005
  • 2Sutton M, Greene A, Amini P. Fuzzing, Brute Force Vulnerability Discovery. USA: Addison-Wesley Professional, 2007
  • 3Chess B, West J. Secure Programming with Static Analysis. USA: Addison Wesley Professional, 2007
  • 4Chess B, McGraw G. Static analysis for security. IEEE Security: Privacy Magazine, 2004, 2(6): 76-79
  • 5Johnson R, Wagner D. Finding user/kernel pointer bugs with type inference//Proceedings of the 2004 USENIX Security Symposium. San Diego, CA, USA, 2004:119-134
  • 6Ashcraft K, Engler D. Using programmer-written compiler extensions to catch security holes//Proceedings of the 2002 IEEE Symposium on Security and Privacy. Oakland, CA, USA, 2002:143-159
  • 7Hallem S, Chelf B, Xie Y, Engler D. A system and language for building system-specific, static analyses//Proceedings of the 2002 ACM Conference on Programming Language Design and Implementation. Berlin, Germany, 2002:69-82
  • 8Cytron R, Ferrante J, Rosen B, Wegman M, Zadeck K. Efficiently computing static single assignment form and the control dependence graph. ACM Transactions on Programming Languages and Systems, 1991, 13(4): 451-490
  • 9Yang J, Kremenek T, Xie Y, Engler D. MECA: An extensible, expressive system and language for statically checking security properties//Proceedings of the 2003 ACM Conference on Computer and Communication Security. Washington, DC, USA, 2003:321-334
  • 10Shankar U, Talwar K, Foster J, Wagner D. Detecting format string vulnerabilities with type qualifiers//Proceedings of the 2004 USENIX Security Symposium. Washington, DC, USA, 2001:201-220

共引文献47

同被引文献31

引证文献3

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部