期刊文献+

漏洞挖掘技术研究 被引量:2

Research on the Discovering Vulnerabilities Technology
下载PDF
导出
摘要 漏洞挖掘是网络攻防技术的重要组成部分。首先介绍了漏洞的概念、漏洞的成因、漏洞的主要分类以及漏洞挖掘一般流程,然后研究了补丁分析和测试技术两种漏洞挖掘方法,重点对二进制补丁比较、白盒测试、黑盒测试等具体漏洞挖掘技术进行了分析,比较了各种漏洞挖掘技术的优缺点。 Vulnerabilities mining is an important part of network at ack and defense technology. First, the concept of vulnerabilities, the causes of vulnerabilities, the vulnerabilities of the main classification and general vulnerabilities mining process are introduced;and then the two vulnerabilities mining methods of patch analysis and testing techniques are discussed, and some specific vulnerabilities mining technologies such as the binary patches technology, white box testing technology, and black box testing technology etc. are simultaneously analyzed, with the comparing the advantages and disadvantages of the various vulnerabilities mining technologies.
出处 《信息安全与技术》 2014年第6期32-35,共4页
关键词 漏洞 漏洞挖掘 测试技术 vulnerability vulnerabilities mining testing technology
  • 相关文献

参考文献3

二级参考文献12

  • 1王前,余静,陈性元,谢寿生.安全隐患检测系统的设计与实现[J].微计算机信息,2005,21(10X):3-4. 被引量:5
  • 2徐良华,孙玉龙,高丰,朱鲁华.基于逆向工程的软件漏洞挖掘技术[J].微计算机信息,2006,22(08X):259-261. 被引量:10
  • 3M. Rekoff. On reverse engineering [J].IEEE Transactions on Systems, Man and Cybernetics, 1955; 15(2):244-252
  • 4Greg Hoglund.软件剖析-代码攻防之道[M].北京:清华大学出版社,2005
  • 5Halvar Flake. Structural Comparison of Executable Objects[J].DIMVA 2004:161-173
  • 6eEyE Security.eEye binary diffing suite(EBDS).Version1.0.5. http://research.eeye.com/html/tools/RT20060801-1.html .
  • 7I.Krsul.Software Vulnerability Analysis[]..1998
  • 8Flake H.Structural comparison of executable objects[].Proceedings of the IEEE Conference on Detection of Intrusions and Malware and Vulnerability Assessment(DIMVA).2004
  • 9Sabin T.Comparing binaries with graph isomorphisms. http://razor.bindview.com/publish/papers/comparing-binaries.ht ml . 2004
  • 10D.Brumley,P.Poosankam,D.Song,J.Zheng."Automatic Patch-Based Exploit Generation is Possible:Techniques and Implications,"[].Security and PrivacySP IEEE Symposium on.2008

共引文献36

同被引文献4

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部