期刊文献+

Collaborative Reversing of Input Formats and Program Data Structures for Security Applications 被引量:1

Collaborative Reversing of Input Formats and Program Data Structures for Security Applications
下载PDF
导出
摘要 Reversing the syntactic format of program inputs and data structures in binaries plays a vital role for understanding program behaviors in many security applications.In this paper,we propose a collaborative reversing technique by capturing the mapping relationship between input fields and program data structures.The key insight behind our paper is that program uses corresponding data structures as references to parse and access different input fields,and every field could be identified by reversing its corresponding data structure.In details,we use a finegrained dynamic taint analysis to monitor the propagation of inputs.By identifying base pointers for each input byte,we could reverse data structures and conversely identify fields based on their referencing data structures.We construct several experiments to evaluate the effectiveness.Experiment results show that our approach could effectively reverse precise input formats,and provide unique benefits to two representative security applications,exploit diagnosis and malware analysis. Reversing the syntactic format of program inputs and data structures in binaries plays a vital role for understanding program behaviors in many security applications. In this paper, we propose a collaborative reversing technique by capturing the mapping relationship between input fields and program data structures. The key insight behind our paper is that program uses corresponding data structures as references to parse and access different input fields, and every field could be identified by reversing its corresponding data structure. In details, we use a fine- grained dynamic taint analysis to monitor the propagation of inputs. By identifying base pointers for each input byte, we could reverse data structures and conversely identify fields based on their referencing data structures. We construct several experiments to evaluate the effectiveness. Experiment results show that our approach could effectively reverse precise input formats, and provide unique benefits to two representative security applications, exploit diagnosis and malware analysis.
作者 ZHAO Lei
出处 《China Communications》 SCIE CSCD 2014年第9期135-147,共13页 中国通信(英文版)
基金 the National Natural Science Foundation of China,the foundation of State Key Lab.for Novel Software Technology in Nanjing University,the foundation of Key Laboratory of Information Assurance Technology
关键词 software security reversingengineering fine-grained dynamic tainting 输入格式 数据结构 应用程序 安全应用 反转 协同 倒车技术 二进制文件
  • 相关文献

参考文献21

  • 1SLOWINSKA A, STANCESCU T, BOSH. Body Ar- mour for Binaries: preventing[C]//Proceedings of 2012 USENIX Annual Technical Conference. 2012.
  • 2COMPARETTI P M, WONDRACEK G, KRUE- GEL C, et al. Prospex: Protocol Specification Extraction[C]//Proceedings of the 30th IEEE Symposium on Security and Privacy. IEEE, 2009: 110-125.
  • 3LIN Z, ZHANG X. Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications[J]. IEEE Transactions on Soft- ware Engineering, 2010, 36(5): 688-703.
  • 4WANG T, WEI T, GU G, et al. TaintScope: A checksum-aware directed fuzzing tool for au- tomatic software vulnerability detection[C]// Proceedings of the 2010 IEEE Symposium on Security and Privacy. IEEE, 2010: 497-512.
  • 5LIN Z, JIANG X, XU D, et al. Automatic proto- col format reverse engineering through con- text-aware monitored execution[C]//Proceed- ings of the 2008 Annual Network & Distributed System Security Symposium. Citeseer, 2008.
  • 6CABALLERO J, YIN H, LIANG Z, et al. Polyglot: Automatic extraction of protocol message format using dynamic binary analysis[C]//Pro- ceedings of the 14th ACM conference on Com- puter and communications security. ACM, 2007: 317-329.
  • 7CUI W, KANNAN J, WANG H J. Discoverer: automatic protocol reverse engineering from network traces[C]//Proceedings of 16th USENIX Security Symposium on USENIX Security Sym- posium. 2007.
  • 8SLOWINSKA A, STANCESCU T, BOSH. Howard: a dynamic excavator for reverse engineering data structures[C]//Proceedings of the 2011 Network and Distributed System Security Sym- posium. 2011.
  • 9LIN Z, ZHANG X, XU D. Automatic reverse en- gineering of data structures from binary execu- tion[C]//Proceedings of the 17th Network and Distributed System Security Symposium. 2010.
  • 10NEWSOME J, SONG D. Dynamic taint analysis for automatic detection, analysis, and signa- ture generation of exploits on commoditysoftware[C]//Proceedings of the 2005 Annual Network and Distributed Systems Security Sym- posium. Internet Society, 2005.

同被引文献9

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部