期刊文献+

基于污点分析的嵌入式设备固件模糊测试方法 被引量:7

A Fuzzing Test Method for Embedded Device Firmware Based on Taint Analysis
下载PDF
导出
摘要 针对现嵌入式设备固件的特点,提出一种基于污点分析的改进模糊测试方法。该方法首先从漏洞利用的角度分析固件的攻击面,然后根据攻击面导出相应的安全规则,并在污点分析结果中引入了测试用例危险权重,最后设计了与危险权重相对应的模糊测试用例集合。通过利用该方法对主流设备进行的漏洞挖掘实验,成功发现隐藏于设备固件中的若干零日漏洞。实验结果证明,该方法具备一定的有效性和实用性。 Combing with the characteristics of embedded device firmwares,an improved fuzzy test method was proposed. After analyzing the attack surface of the firmwares from the standpoint of exploits utilization,several security rules were derived. By introducing the crisis weights of test cases in taint analytical results,a set of fuzzy test cases that are corresponding to crisis weights was designed. The method was used to dig vulnerabilities in popular equipments,and many zero-day exploits were found. Experimental results showed that this method is effective and practical.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2016年第2期125-131,共7页 Journal of Sichuan University (Engineering Science Edition)
基金 国家重点基础研究发展计划资助项目(2014CB340600) 国家高技术研究发展计划资助项目(2015AA016002) 国家自然科学基金重点项目资助(61332019) 国家自然科学基金资助项目(61173138 61272452) 湖北省重点新产品新工艺研究开发项目资助(2012BAA03004) 华为创新研究计划资助项目(YB2013110084)
关键词 嵌入式 固件 漏洞挖掘 污点 危险权重 embedded device firmware vulnerability detecting taint risk weight
  • 相关文献

参考文献7

二级参考文献47

  • 1邵林,张小松,苏恩标.一种基于fuzzing技术的漏洞发掘新思路[J].计算机应用研究,2009,26(3):1086-1088. 被引量:17
  • 2张宝峰,张翀斌,许源.基于模糊测试的网络协议漏洞挖掘[J].清华大学学报(自然科学版),2009(S2):2113-2118. 被引量:14
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 4B.P. Miller, L. Fredrikson, B. So, An empirical study of the reliability of UNIX utilities, Comm. of the ACM 33 (1990) 32.
  • 5P. Godefroid, M. Levin, D. Molnar, Automated whitebox fuzz testing, In NDSS, 2008.
  • 6P. Godefroid, P. Halleux, A.V. Nori, S.K. Rajamani, W. Schulte, N. Tillmann, Automating software testing using program analysis, IEEE Software (2008) 30-37.
  • 7D. Aitel, The Advantages of Block-Based Protocol Analysis for Security Testing, Immunity Inc., 2002.
  • 8T. Boutell, et al., PNG (Portable Network Graphics) Specification, Version 1.0, IETF Request for Comments 2083.
  • 9C. Luk. R. Cohn. R. Muth. et al.. Pin: Building customized program analysis tools with d) namic insY:rumentation, in: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI2005). 2007. DP. 190-200.
  • 10P.J. Schroeder. B. Korel, Black-box test reduction using l/O analysis, in: Proceedings of the International Symposium on Software and Analysis (ISSTA '00), Portland, Oregon, August 2000.

共引文献97

同被引文献42

引证文献7

二级引证文献64

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部