期刊文献+

一种基于虚拟执行与判定覆盖结合的Flash漏洞检测方法

Flash vulnerability detection based on virtual execution and branch coverage
下载PDF
导出
摘要 基于Flash在网络上应用十分广泛,但一直以来不断出现许多严重的安全问题,提出并实现一种基于虚拟执行与判定覆盖相结合的Flash漏洞检测方法。对于待检测的Flash文件,通过对其进行反编译得到ActionScript代码;然后,分析其类结构,根据分析的结果生成多个虚拟执行流程,每个虚拟流程是对某一段代码的虚拟执行;最后,将虚拟流程的执行结果与漏洞规则进行匹配以判断是否包含漏洞。测试结果表明:所提出的漏洞检测方法具有误判率低、执行效率高的特点。 Based on the fact that Flash has many serious security problems through widely used in the Intemet, a detection method for Flash vulnerability based on virtual execution and branch coverage was proposed. Firstly, Flash file was decompiled and scanned to get the ActionScript code. Secondly, the class structure was analyzed and multiple virtual execution processes were generated according to the analysis. Finally it was determined whether the Flash file contained vulnerabilities after each virtual execution process. The results indicate that the method has advantages of low false positives and high execution efficiency.
出处 《中南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2013年第12期4910-4915,共6页 Journal of Central South University:Science and Technology
基金 国家自然科学基金资助项目(61202494 61202341) 湖南省科技计划重点项目(2011GK2008) 新世纪优秀人才支持计划项目(NCET-10-0798) 金属矿山安全技术国家重点实验室开放基金资助项目(2012KFJJ02)
关键词 FLASH 漏洞检测 虚拟执行 网络安全 Flash vulnerability detection virtual execution network security
  • 相关文献

参考文献14

  • 1Emigh J.. New flash player rises in the web-video market[J]. Computer, 2006, 39(2): 14-16.
  • 22012年10月十大重要安全漏洞分析[J].信息网络安全,2012(12):89-89. 被引量:1
  • 3Holm H. Performance of automated network vulnerability scanning at remediating security issues[J]. Computers & Security, 2012, 31(2): 164-175.
  • 4Wallach D. Technical perspective tools for information to flow securely and swiftly[J]. Communications of the ACM, 2009, 52(2): 78-80.
  • 5杨丁宁,肖晖,张玉清.基于Fuzzing的ActiveX控件漏洞挖掘技术研究[J].计算机研究与发展,2012,49(7):1525-1532. 被引量:10
  • 6黄正.一种检测恶意flash文件的方法和装置:中国,201210027110.8[P].[2012-02-10].
  • 7Wang T, Wei T, Gu G, et al. Checksum-aware fuzzing combined with dynamic taint analysis and symbolic execution[J]. ACM Transactions on Information and System Security, 2011, 14(2): 1-25.
  • 8Lund K, Moulton M, Nicholson S. Adobe flash player vulnerability research[EB/OL]. [2011-11-15]. http://mason.gmu. edu/-msherif/isa564/fall 11/proj ects/adobe.pdf.
  • 9刘建,倪宏.一种ActionScript解释器的设计与实现[J].微计算机应用,2010,31(7):63-66. 被引量:2
  • 10De Vries B W, Gupta G, Hamlen K W, et al. ActionScript bytecode verification with co-logic programming[C]//Dublin: ACM SIGPLAN Workshop On Programming Languages and Analysis For Security, 2009: 9-15.

二级参考文献31

  • 1Zhang Jian, Wang Xiao-Xu. A constraint solver and its application to path feasibility analysis. International Journal of Software Engineer and Knowledge Engineer, 2001, 11 (2) : 139-156.
  • 2Beizer B. Software Testing Techniques. New York, NY, USA: John Wiley & Sons, Inc. , 1989.
  • 3Zhang Jian. Symbolic execution of program paths involving pointer and structure variables//Proceedings of the 4th International Conference on Quality Software (QSIC2004). IEEE Computer Society, Braunschweig, Germany, 2004:87-92.
  • 4Ruan Hui, Zhang Jian, Yan Jun. Test data generation for C programs with string-handling functions//Proceedings of the 2nd IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering (TASE2008). Nanjing, China: IEEE Computer Society, 2008:219-226.
  • 5Velroyen H. Automatic non-termination analysis of imperative programs [M. S. dissertation]. Chalmers University of Technology, Goteborg, 2007.
  • 6Bradley A, Manna Z, Sipma H. Linear ranking with reachability//Proceedings of the 17th International Conference on Computer Aided Verification (CAV 2005). Edinburgh, Scot land, UK, 2005:491-504.
  • 7Bradley A, Manna Z, Sipma H. The polyranking principle// Proceedings of 32nd International Colloquium on Automata, Language and Programming (ICALP 2005). Lisbon, Portugal, 2005:1349-1361.
  • 8Yang Lu, Zhan Naijun, Xia Bican, Zhou Chaochen. Program verification by using DISCOVERER//Proceedings of the first International Conference on Verified Software: Theories, Tools, Experiments (VSTTE 2005). Zurich, Switzerland, 2005:528-538.
  • 9Cook B, Podelski A, Rybalchenko A. Abstraction refinement for termination//Proceedings of the 12th International Symposium on Static Analysis (SAS 2005). London, UK, 2005: 87-101.
  • 10Rodriguez Carbonell E, Kapur D. Program verification using automatic generation of invariants//Proceedings of the 1st International Colloquium on Theoretical Aspects of Computing(ICTAC 2004). Guiyang, China, 2004:325-340.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部