期刊文献+

基于符号执行的漏洞检测系统

Based on the symbolic execution vulnerability detection system
下载PDF
导出
摘要 目前,软件安全至关重要,而威胁到软件安全性能的罪魁祸首正是软件自身,即软件漏洞。软件漏洞有语言漏洞、逻辑漏洞等。模糊测试是检测漏洞方面使用的较多的一种技术,它能够根据输入自动生成测试用例,这种方法不需要测试人员的过多干预。但过多的冗余测试也是这种方法难以消除的。为了解决这个缺点,生成有效的测试用例,文中实现了基于符号执行的漏洞检测系统。符号化输入是该系统的前提,程序插桩可以获取符号变量之间的关系。通过求解在分支语句处的约束条件可以得到新的测试输入。实验证明本系统能较智能地进行漏洞检测,也大大地提升了漏洞检测的性能。 At present,the software security is very important,and the threat to the software security performance is the software itself, which is software vulnerabilities. Software vulnerabilities have loopholes in language,logic,etc. Fuzzy testing is a technology used in the detection of vulnerabilities,which can automatically generate test cases according to the input. This method does not need to test the excessive intervention of the personnel. However,this method is difficult to eliminate the drawbacks of redundant testing. In order to solve this shortcoming,the paper realizes the flaw detection system based on symbol execution. The symbolic input is the premise of the system,and the program can obtain the relationship between the symbolic variables. By solving the constraint condition at the branch sentence,the new test input is obtained. The experiments show that the system can detect the vulnerabilities of the intelligence,and improve the performance of the detection.
作者 吴情彪
出处 《信息技术》 2016年第5期171-174,182,共5页 Information Technology
关键词 漏洞 冗余 符号执行 插桩 路径约束 自动化 vulnerability redundancy symbolic execution instrumentation path constrain automation
  • 相关文献

参考文献10

  • 1宋超臣,黄俊强,王大萌,段志鸣.计算机安全漏洞检测技术综述[J].信息网络安全,2012(1):77-79. 被引量:28
  • 2King J C.Symbolic execution and program testing[C].Communications of the ACM,2009:385-394.
  • 3Halfond W G,Choudhary S R,Orso A.Penetration testing with improved input vector identification[C].IEEE,2009.
  • 4Howard M,Leblanc D.Writing secure code[M].O’Reilly Media,Inc.,2009.
  • 5Juranid L.Using fuzzing to detect security vulnerabilities[J].Retrieved Apr.2006,26:2012.
  • 6Barrett C,Stump A,Tinelli C.The smt-lib standard:Version 2.0[C].2010.
  • 7过辰楷,姬秀娟,许静.基于分支混淆算法的符号执行技术[J].计算机科学,2012,39(9):115-119. 被引量:3
  • 8Barrett C,Sebastiani R,Seshia S A,et al.Satisfiability modulo theories[J].Handbook of Satisfiability,2009,185:825-885.
  • 9魏瑜豪,张玉清.基于Fuzzing的MP3播放软件漏洞发掘技术[J].计算机工程,2007,33(24):158-160. 被引量:28
  • 10Godefroid P,Levin M Y,Molnar D.Sage:Whitebox fuzzing for security testing[J].Queue,2012,10(1):20.

二级参考文献22

  • 1洪宇,陈光,于见平,韩柯.处理符号执行中数组元素混淆的一种新方法[J].计算机应用,2005,25(B12):434-436. 被引量:2
  • 2张观录.基于windows平台的软件安全漏洞发掘技术研究[D].四川:电子科技大学,2007.
  • 3Foster J S, Fghndrich M, Aiken A. A Theory of Type Qualifiers[J]. ACM SIGPLAN Notices, 1999, 34(05): 192-203.
  • 4Cowan C,Wagle P,Pu C,et al.Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decade[C]//Proc.of DARPA Information Survivability Conference and Exposition.[S.l.]:DARPA Press,2000.
  • 5Du Wenliang,Mathur A P.Vulnerability Testing of Software System Using Fault Injection[R].Coast,TR 98-02,1998.
  • 6Evans D,Larochelle D.Improving Security Using Extensible Lightweight Static Analysis[J].IEEE Software,2002,19(1):42-51.
  • 7King J C. Symbolic execution and program testing [J].Commun ACM, 1976,19(7) : 385-394.
  • 8Godefroid P, Klarlund N, Sen K. DART: directed automated ran dom testing[C]//Proceedings of the 2005 ACM SIGPLAN Con ference on Programming Language Design and Implementation. New York, USA, 2005 : 213- 223.
  • 9Sen K, Agha G. CUTE and Jcute: Concolic unit testing and ex- plicit path model-checking tools[C]//Proceedings of Conference on Computer Aided Verification. 2006,4144:419-423.
  • 10Cadar C, Ganesh V, Pawlowski P, et al. EXE: Automatically generating inputs of death[J]. ACM Transaction on Information and System Security, 2008,12 : 1-38.

共引文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部