期刊文献+

典型文档类CVE漏洞检测工具的研究与实现 被引量:5

Research and Implementation of Typical Document CVE Vulnerability Detection Tools
下载PDF
导出
摘要 近年来,随着计算机网络的广泛应用,基于文件格式的软件漏洞检测技术成为软件安全领域的一个研究热点。文章首先对MS Office和Adobe PDF的文件格式进行分析,在对传统漏洞检测技术研究的基础上,提出了3种文档类漏洞检测技术,分别为基于污点数据结构的静态检测技术、基于污点数据流的动态检测技术和基于行为的启发式检测技术;接着完成了典型文档类CVE漏洞检测工具的设计与实现;最后在仿真平台上对工具进行测试,测试结果表明,文章提出的漏洞检测工具与同类工具相比,具有更高的检测率。 Recently, with the wide development of computer network, file format-based software vulnerability detection technology has become one of the research hotspots of information security. This paper ifrstly analyzes the ifle formats of Microsoft Ofifce and Adobe PDF. On the basis of the study on traditional vulnerability detection techniques, three document vulnerability detection methods are put forward:static detection method based on tainted data structure, dynamic detection method based on tainted data lfow, heuristic detection method based on behavior. Then the typical document class CVE vulnerability detection tool is realized and is experimented in the simulation platform. The results show that comparing with similar tools, the tool proposed in this paper has a higher detection rate.
出处 《信息网络安全》 2014年第6期18-22,共5页 Netinfo Security
基金 国家自然科学基金[61170282]
关键词 CVE漏洞检测 文件格式 MS OFFICE ADOBE PDF CVE vulnerability detection ifle format MS Ofifce Adobe PDF
  • 相关文献

参考文献5

  • 1王清.Oday安全:软件漏洞分析技术[M].北京:电子工业出版社,2008.
  • 2段刚.加密与解密(第三版)[M].北京:电子工业出版社,2008:102-103,121-126,392-395,321-323.
  • 3刘海燕,杨洪路,王崛.C源代码静态安全检查技术[J].计算机工程,2004,30(2):28-30. 被引量:9
  • 4Greg Banks, Marco Cova, Viktoria Felmetsger,et al.SNOOZE: Toward a Stateful Network protocol fuzzer[J].Information Security.Lecture Notes in Computer Science Volume 4176,2006,pp343-358.
  • 5张保稳,施军,张晖.缓冲区溢出漏洞检测技术研究进展[J].计算机应用与软件,2006,23(1):3-4. 被引量:4

二级参考文献23

  • 1[1]Wagner D,Foster J,Brewer E, et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.In Proceedings of the Year 2000 Network and Distributed System Security Symposium(NDSS),San Diego, CA,2000:3-17
  • 2[2]Biega J.ITS4:A Static Vulnerability Scanner for C and C++ Code. http://www.rstcorp.com
  • 3[3]Bishop M,Dlger M.Checking for Race Conditions in File Access.Computing Systems, 1996,9(2): 131 - 152
  • 4[4]Austin T M,Breach S E,Sohi G S.Efficient Detection of All Pointer and Array Access Errors. http://citeseer.nj.nec.com/1096.html
  • 5C. Cowan, P. Wagle, C. Pu, S. Beattie and J. Walpole, Buffer overflows :Attacks and defenses for the vulnerability of the decade, In Proceedings of the DARPA Information Survivability Conference and Expo,1999.
  • 6John Viega, J. T. Bloch, Tadayoshi Kohno and Gary McGraw. ITS4 : A Static Vulnerability Scanner for C and C + + Code. Annum Computer Security Applications Conference. December 2000.
  • 7David Evans, John Guttag, Jim Homing and Yang Meng Tan. LCLint:A Tool for Using Specifications to Check Code. SIGSOFT Symposium on the Foundations of Software Engineering. December 1994.
  • 8D. Larochelle and D. Evans, Statically detecting likely buffer overflow vulnerabilities. In USENIX Security Symposium, Washington, D. C. ,August 2001.
  • 9Alexander Aiken, Introduction to Set Constraint-Based Program Analysis. Science of Computer Programming, Volume 35, Numbers 2 - 3. November 1999.
  • 10Yichen Xie, Andy Chou and Dawson Engler, ARCHER: Using Symbolic,Pathsensitive Analysis to Detect Memory Access Errors. ESES/FSE'03, Helsinki, Finland. September 1 - 5,2003.

共引文献15

同被引文献85

  • 1邵旭东,薛质.数字签名中电子文档的可信显示[J].信息网络安全,2008(3):62-64. 被引量:1
  • 2孔凡芝,张兴周,谢耀菊.基于Adaboost的人脸检测技术[J].应用科技,2005,32(6):7-9. 被引量:19
  • 3Gary Bradski,Adrian Kaehler.学习OpenCV[M].北京:清华大学出版社,2008.
  • 4Corporation S. Internet Security Threat Report (ISTR.) [R.]. California:Symantec Corporation, 2014.
  • 5Apvrille A. Symbian worm Yxes: Towards mobile botnets?[J]. Journalin Computer Virology, 2012, 8(4): 117-131.
  • 6Hua J, Sakurai K. A sms-based mobile botnet using flooding algorithm,Information Security Theory and Practice[J].Security and Privacy ofMobile Devices in Wireless Communication: Springer, 2011: 264-279.
  • 7Hamandi K, Elhajj I H, Chehab A, et al. Android SMS botnet: a newperspective[C]// Proceedings of the 10th ACM international symposiumon Mobility management and wireless access, 2012: 125-130.
  • 8Geng G, Xu G, Zhang M, et al. The design of sms based heterogeneousmobile botnet[J].Journal of Computers, 2012, 7(1): 235-243.
  • 9Zeng Y, Shin K G, Hu X. Design of SMS commanded-and-controlled and P2P-structured mobile botnets[C]// Proceedings of thefifth ACM conference on Security and Privacy in Wireless and MobileNetworks, 2012: 137-148.
  • 10Mtibaa A, Harras K A, AJnuweiri H. Malicious attacks in MobileDevice Clouds: A data driven risk assessment[C]/ /ComputerCommunication and Networks (ICCCN), 2014 23rd InternationalConference on, 2014: 1-8.

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部