期刊文献+

Fuzzing过程中的若干优化方法 被引量:11

Improved fuzzy analysis methods
原文传递
导出
摘要 在软件漏洞挖掘领域,Fuzzing测试是使用最广泛、最有效的方法之一。传统Fuzzing测试方法存在工作效率低、盲目性强等不足。该文提出一种样本集精简算法和一种加权的测试时间模型,能够在保证代码覆盖率不变的情况下减少测试样本的数量,同时使优质的样本得到更多的测试时间片;设计了一种基于污点传播的异常分析方法,可评估异常信息的危害程度,有助于提高漏洞分析的效率。实验结果表明:与Peach实验进行对比,该文提出的方法有效地改进了传统的Fuzzing测试方法。 Fuzzing testing is one of the most widely used and most effective methods for vulnerability detection. However, the traditional fuzzy analysis method is inefficient and works blindly. This paper describes a refining method that reduces the test sample size with the same code coverage. A weighted testing time model is used to give the better sample more time. A taint based exception analysis method is used to evaluate the severity of exceptions and to improve the vulnerability analysis efficiency. Comparisons with Peach show that this method improves the traditional fuzzy analysis method.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2016年第5期478-483,共6页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金资助项目(61502536) 河北省高等学校青年拔尖人才计划项目(BJ201414)
关键词 模糊测试 精简集 漏洞分析 Fuzzing refining set vulnerability analysis
  • 相关文献

参考文献17

二级参考文献142

  • 1陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(z1):1933-1938. 被引量:115
  • 2邵林,张小松,苏恩标.一种基于fuzzing技术的漏洞发掘新思路[J].计算机应用研究,2009,26(3):1086-1088. 被引量:17
  • 3张宝峰,张翀斌,许源.基于模糊测试的网络协议漏洞挖掘[J].清华大学学报(自然科学版),2009(S2):2113-2118. 被引量:14
  • 4刘立芳,霍红卫,王宝树.PHGA-COFFEE:多序列比对问题的并行混合遗传算法求解[J].计算机学报,2006,29(5):727-733. 被引量:11
  • 5Russinovich M E, Solomon D. Microsoft Windows Internals, fourth edition: Microsoft Windows ServerTM 2003, Windows XP, and Windows 2000 [M]. Washington: Microsoft Press, 2004:540-550.
  • 6Cousot P, Cousot R. Abstract interpretation: A unified lattice model /or static analysis of programs by construction or approximation of fixpoints [C] //Proc of the 4th ACM SIGACT-SIGPLAN Symp on Principles of Programming Languages (POPL). New York: ACM, 1977: 238-252.
  • 7Shankar U, Talwar K, Foster J S, et al. Detecting format string vulnerabilities with type qualifiers [C] //Proc of the 10th USENIX Security Symp. Berkeley: USENIX, 2001: No 16.
  • 8Foster J S, Terauchi T, Aiken A. Flow sensitive type qualifiers [C] //Proc of the ACM SIGPLAN'02 Conf on Programming Language Design and Implementation (PLDI). New York: ACM, 2002: 1-12.
  • 9Foster J S, Fahndrich M, Aiken A. A theory of type qualifiers [C] //Proe of the ACM SIGPLAN'99 Conf on Programming Language Design and Implementation (PLDI). New York: ACM, 1999:192-203.
  • 10Ceara D. Deteeting software vulnerahilities static taint analysis [D]. Bucharest, Romania: Politehnica University of Bucharest, 2009.

共引文献184

同被引文献54

引证文献11

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部