期刊文献+

基于语义规则的污点传播分析优化方法 被引量:2

Optimization method of taint propagation analysis based on semantic rules
下载PDF
导出
摘要 离线污点分析中的针对轨迹记录文件的污点传播分析的时间开销非常巨大,因此研究快速高效的污点传播分析具有重要意义。针对上述问题,提出了一种基于语义规则的污点传播分析优化方法。该方法定义了一种指令的语义描述规则,用于描述指令的污点传播语义,利用中间语言自动生成汇编指令的语义规则,再根据语义规则进行污点传播分析,避免了现有污点分析方法中指令重复执行导致的重复语义解析,提高了污点分析的效率。实验结果表明,所提方法能够有效降低污点传播分析的时间开销,仅占传统基于中间语言污点分析的14%左右,提高了分析效率。 Time overhead of the taint propagation analysis in the off-line taint analysis is very large, so the research on efficient taint propagation has important significance. In order to solve the problem, an optimization method of taint propagation analysis based on semantic rules was proposed. This method defined semantic description rules for the instruction to describe taint propagation semantics, automatically generated the semantics of assembly instructions by using the intermediate language, and then analyzed taint propagation according to the semantic rules, to avoid the repeated semantic parsing caused by repeating instructions execution in the existing taint analysis method, thus improving the efficiency of taint analysis. The experimental resuhs show that, this method can effectively reduce the time cost of taint propagation analysis, only costs 14% time of the taint analysis based on intermediate language.
出处 《计算机应用》 CSCD 北大核心 2014年第12期3511-3514,共4页 journal of Computer Applications
基金 国家科技支撑计划项目(2012BAH47B01) 国家自然科学基金资助项目(61309007) 郑州市科技创新团队项目(10CXTD150)
关键词 离线污点分析 轨迹跟踪 语义规则 污点传播 时间开销 off-line taint analysis track recording semantic rule taint propagation time overhead
  • 相关文献

参考文献8

  • 1刘豫,王明华,苏璞睿,冯登国.基于动态污点分析的恶意代码通信协议逆向分析方法[J].电子学报,2012,40(4):661-668. 被引量:9
  • 2王卓.基于符号执行的二进制代码动态污点分析[D].上海:上海交通大学,2010.
  • 3PATIL H, PEREIRA C, STALLCUP M, et al. PinPlay: a frame- work for deterministic replay and reproducible analysis of parallel programs[ C]//Proceedings of the 8th Annual IEEE/ACM Interna- tional Symposium on Code Generation and Optimization. New York: ACM, 2010:2 - 11.
  • 4LUK C K. Pin: building customized program analysis tools with dy- namic instrumentation [ EB/OL]. [ 2014-06- 12]. http://www, cs. virginia, edu/papers/p190-luk, pdf.
  • 5BRUENING D L. Efficient, transparent, and comprehensive runt- ime code manipulation [ D]. Canbridge: MIT, 2004.
  • 6NETHERCOTE N, SEWARD J. Valgrind: a framework for heavy- weight dynamic binary instrumentation[ EB/OL]. [ 2014 - 04 - 20]. http://valgrind, org/docs/valgrind2007, pdf.
  • 7SONG D, BRUMLEY D, YIN H, et al. BitBlaze: a new approach to computer security via binary analysis[ M]. Berlin: Springer, 2008:1-25.
  • 8BRUMLEY D, JAGER I, AVGERINOS T, et al. BAP: a binary analysis platform[ C]// Proceedings of the 23rd International Con- ference on Computer Aided Verification. Berlin: Springer, 2011: 463 - 469.

二级参考文献14

  • 1胡振宇,刘在强,苏璞睿,冯登国.基于协议分析的IM阻断策略及算法分析[J].电子学报,2005,33(10):1830-1834. 被引量:5
  • 2W Cui,M Peinado, H J Wang, and M E Locasto. Shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing[ A ]. IEEE Symposium on Security and Privacy[C]. Oakland, USA,May 20 - 23,2007.252 - 266.
  • 3The SNORT network intrusion detection systeml OL ]. http:// www. snort, org.
  • 4W Cui,J Kannan, and H J Wang.Discoverer:Automatic Proto- col Reverse Engineering from Network Traces[ A]. Proceedings of the 16th USENIX Security Symposium[ C]. Boston, MA, Au- gust. 2007.
  • 5Higgins D G, Sharp P M. CLUSTAL: a package for performing multiple sequence alignment on a microcomputer[ J ]. Gene 73 (1) : 237 - 44.1988.
  • 6J Caballero and D Song.Polyglot:Automatic Extraction of Pro- tocol Format using Dynamic Binary Analysis [ A ]. In ACM Conference on Computer and Communications Security(CCS ), 2007[ C]. Singapore,March 20- 22,2007.
  • 7Z Lin, X Jiang, D Xu, X Zhang. Automatic Protocol Fonnat Reverse Engineering through Context-Aware Monitored Execu- tion[ A] .Proceedings of the 15th Annual Network and Disllibut- ed System Security Symposium (NDSS' 08) [ C]. Feb. 2008.
  • 8G Wondracek,P M Comparetti,C Kruegel, and E Krida. Auto- matic Network Protocol Analysis[ A ]. Proceedings of the 15th Annual Network and Distributed System Secrurity Symposium (NDSS'08) [C]. Feb.2008.
  • 9The Protocol Information Projects [ OL ]. http://baselinere- search, net/PL/.
  • 10Weidong Cni,Marcus Peinado, Karl Chen,Helen J Wang,andLuis Irun-Briz. Tupni:Automatic Reverse Engineering of Input Formats[ A ]. Proceedings of the 15th ACM Conferences on Computer and Communication Security[ C]. CCS 2008 (Octo- ber 2008).

共引文献9

同被引文献21

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部