期刊文献+

基于符号执行的测试数据生成方法的研究与设计 被引量:4

RESEARCH AND DESIGN OF SYMBOL EXECUTION-BASED TEST DATA GENERATION METHOD
下载PDF
导出
摘要 软件漏洞的研究是信息安全的一个重要分支。漏洞挖掘的主要方法是通过精心构造测试数据输入程序来触发漏洞,由此可见如何生成测试数据是该技术的关键,也是成功挖掘漏洞的关键。在分析漏洞存在原理和触发条件的基础上,提出一种更为高效的测试数据生成方法。该方法通过不安全函数来定位漏洞的触发点,深度与宽度混合遍历来确定触发的路径,利用符号执行技术来确立漏洞触发的条件,最后再根据条件生成测试数据,使生成的数据不仅有更高针对性,并且还提高了代码的覆盖率,从而能提高漏洞挖掘的效率和准确性。实验结果表明该方法具有良好的效率和准确性。 The research on software vulnerabilities is one of the most important branches in information security.The main vulnerability discovery method is to input the elaborately structured test data to the program to trigger the vulnerability.So one can see that how to generate the test data is the key of the technology and the key for successful vulnerability discovery.Based on the analysis of existence principle of the vulnerability and triggering condition,we present a kind of more efficient test data generation method.In this method,the trigger points of the vulnerabilities are located by unsafe functions,the trigger paths are determined by mixed traversal in depth and width,and the trigger condi-tions of the vulnerabilities are determined by symbols execution technology,at last the test data are generated on the basis of these conditions. The test data formed in this way become more targeted,and the coverage rate of the code is raised as well,consequently the efficiency and ac-curacy of software vulnerability discovery can be increased.Experimental results show that the method has good efficiency and accuracy.
出处 《计算机应用与软件》 CSCD 北大核心 2014年第2期303-306,共4页 Computer Applications and Software
关键词 测试数据生成 不安全函数 混合遍历 符号执行技术 漏洞挖掘 Test data generation Unsafe functions Mixed traversal Symbols execution technology Vulnerability discover
  • 相关文献

参考文献8

  • 1Cadar C,Ganesh V,Pawlowski P M. EXE:Automatically Gen-erating Inputs of Death[A].New York,USA,2006.322335.
  • 2黄奕,曾凡平,曹青.基于库函数动态跟踪的Fuzzing测试方法[J].计算机工程,2010,36(16):39-41. 被引量:2
  • 3Sparks S,Embleton S,Cunningham R. Automated Vulnerability Analysis:Leveraging Control Flow for Evolutionary Input Crafting[A].2007.477486.
  • 4King J C. Symbolic Execution and Program Testing[J].{H}Journal of the ACM,1976,(07):385394.
  • 5Sen K,Marinov D,Agha G. Cute:a concolic unit testing engine for c[A].{H}New York,USA,2005.263272.
  • 6张美超,曾凡平,黄奕.基于漏洞库的fuzzing测试技术[J].小型微型计算机系统,2011,32(4):651-655. 被引量:10
  • 7Oehlert P. Violating Assumptions withFuzzing[J].IEEE Security&Privacy,2005,(02):5862.
  • 8唐彰国,钟明全,李焕洲,张健.基于Fuzzing的文件格式漏洞挖掘技术[J].计算机工程,2010,36(16):151-153. 被引量:11

二级参考文献23

  • 1郑玉彤.库函数调用的安全性分析[J].微计算机应用,2006,27(3):319-322. 被引量:2
  • 2Oehlert P.Violating Assumptions with Fuzzing[J].IEEE Security & Privacy,2005,3(2):58-62.
  • 3Adobe Systems Inc.PDF Reference[EB/OL].(2008-04-15).http:// www.adobe.com/devnet/pdf/pdfs/PDFReference13.pdf.
  • 4CVE.CVE安全公告[EB/OL].(2009-03-24).http://cve.mitre.org/ cve/index.html.
  • 5Sutton M, Greene A, Amini P. Fuzzing:brute force vulnerability discovery [ M ]. Boston, MA, USA: Addison-Wesley Professional, 2007.
  • 6Miller Barton P,Fredriksen Louis,So Bryan. An empirical study of the reliability of unix utilities [ J ]. Communications of the ACM, 1990,33(12) :32-44.
  • 7Miller B P, Koski D, Lee C P. Fuzz revisited: a re-examination of the reliability of UNIX utilities and servic-es[R]. CS-TR-1995-1268, Madison, USA:University of Wisconsin-Madison, 1995.
  • 8PROTOS-security testing of protocol implementations[EB/OL]. https ://www. ee. oulu. fi/research/ouspg/Protos, 1999.
  • 9Takanen Ari, Dcmott Jared, Miller Charlie. Fuzzing for software security testing and quality assurance [ M ]. USA: Arte, ch House, 2008.
  • 10Banks Greg, Marco Cova, Felmetsger Viktoria,et al. SNOOZE: toward a stateful network protocol fuzzer[C]. Proceedings of the 9th Information Security Conference, Samos, Greece,2006,343-358.

共引文献20

同被引文献24

  • 1CSALLNER C,SMARAGDAKIS Y.Check′n′crash:combining static checking and testing[C]//Proceedings of the 27th International Conference on Software Engineering.USA:ACM,2005:422-431.
  • 2TAHAT L H,VAYSBURG B,KOREL B,et al.Requirementbased automated black-box test generation[C]//Proceedings of2001 25th Annual International Computer Software and Applications Conference.Chicago:IEEE,2001:489-495.
  • 3NETHERCOTE N,SEWARD J.Valgrind:a framework for heavyweight dynamic binary instrumentation[C]//Proceedings of 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation.USA:ACM,2007:89-100.
  • 4GODEFROID P,LEVIN M,MOLNAR D.Automated whitebox fuzz testing[R].US:Microsoft,2006.
  • 5GODEFROID P,LEVIN M Y,MOLNAR D.Active property checking[C]//Proceedings of the 7th ACM International Conference on Embedded Software.USA:ACM,2007:207-216.
  • 6陈爱红,彭伟民.堆溢出原理及利用技术的分析研究[J].计算机与数字工程,2008,36(9):117-119. 被引量:3
  • 7吴志勇,夏建军,孙乐昌,张旻.多维Fuzzing技术综述[J].计算机应用研究,2010,27(8):2810-2813. 被引量:12
  • 8黄奕,曾凡平,曹青.基于库函数动态跟踪的Fuzzing测试方法[J].计算机工程,2010,36(16):39-41. 被引量:2
  • 9王学,李学新,周智鹏,袁耀文.S2E测试平台及并行性能分析[J].信息网络安全,2012(7):16-19. 被引量:4
  • 10刘春玲,雷海红.黑盒测试用例设计方法研究[J].现代电子技术,2012,35(20):46-48. 被引量:14

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部