期刊文献+

二进制程序漏洞挖掘关键技术研究综述 被引量:14

A Survey of the Key Technology of Binary Program Vulnerability Discovery
下载PDF
导出
摘要 漏洞在当前的网络空间中已被各方所关注。虽然源代码漏洞分析取得显著进展且具有语义丰富的特点,但实际应用中大量软件均以二进制代码形式存在,因此,针对二进制代码的漏洞挖掘技术研究具有很强的实用价值。文章简要介绍了目前较为典型的二进制漏洞分析框架,并根据现有研究工作,提出未来对二进制程序漏洞挖掘技术研究的整体思路,随后对其中的一些关键点、关键技术分别进行了调研。文章首先对中间语言的研究背景和意义进行了简要介绍;其次针对污点分析、符号执行以及模糊测试三项关键技术,分别介绍了三者的基本原理和分类标准、处理流程、研究现状以及存在的问题;最后进行了简单的总结。文章对二进制程序的漏洞挖掘技术进行了简要的研究,有助于开展后续研究工作。 In the current cyberspace, vulnerability has been attracted the widespread attention. Although source-code-oriented vulnerability analysis has made significant progress and has the characteristics of rich semantic, but many commercial software exists in the form of binary code in practical application. Therefore, binary-executable-oriented vulnerability discovery is more meaningful and useful. This paper first briefly introduces the typical binary vulnerability analysis framework. Based on the existing research work, this paper puts forward the whole idea of the research on the vulnerability discovery technology of binary program in the future, and then makes some research on some key points and key technologies respectively. Firstly, this paper briefly introduces the research on the key technologies of binary-executable-oriented background and significance of the intermediate language. Secondly, according to the three key technologies of taint analysis, symbolic execution and fuzzing, this paper introduces the basic principles and classification standards, processing flow, research situation and existing problems, respectively, and finally gives a simple summary. In this paper, a brief study of the binary program vulnerability discovery technology is given, which is helpful to carry out the follow-up research work.
出处 《信息网络安全》 CSCD 2017年第8期1-13,共13页 Netinfo Security
基金 国家重点研发计划[2016QY07X1404]
关键词 漏洞挖掘 二进制程序 污点分析 符号执行 模糊测试 vulnerability discovery binary program taint analysis symbolic execution fuzzing
  • 相关文献

参考文献16

二级参考文献217

  • 1陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(z1):1933-1938. 被引量:115
  • 2周晓聪.类型系统的λω×_≤等式理论及其语义的合理性[J].计算机研究与发展,2006,43(5):874-880. 被引量:2
  • 3包云锃.构建基于动态二进制翻译技术的进程虚拟机[D].上海:上海交通大学,2007.
  • 4Cifuentes C,Emmerik M V.UQBT:Adaptable Binary Translation at Low Cost[J].IEEE Computer,2000,33(3):60-66
  • 5Klaiber A.The Technology Behind Crusoe Processors[Z].[S.l.]:Transmeta Corpration,2000.
  • 6Bala V,Duesterwald E,Banerjia S.Dynamo:A Transparent Dynamic Optimization System[C]//Proc.of the ACM Conf.on Programming Language Design and Implementation.Vancouver,British Columbia,Canada.[s.n.],2000.
  • 7Nethrcote N,Seward J.Valgrind:A Framework for Heavyweight Dynamic Binary Instrumentation[C]//Proceedings of the ACM Conference on Programming Language Design and Implementation.San Diego,California,USA:[s.n.],2007.
  • 8Adve V,Lattner C,Brukman M,et al.LLVA:A Low-level Virtual Instruction Set Architecture[C]//Proceedings of the 36th Annual IEEE/ACM International Symposium on Microarchitecture.San Diego,California,USA:[s.n.],2003.
  • 9Engler D R.VCODE:A Retargetable,Extensible,Very Fast Dynamic Code Generation System[C]//Proc of ACM Conf.on Programming Language Design and Implementation.New York,USA:[s.n.],1996.
  • 10Vcnkataramani G, Doudalis I, Solihin Y, Prvulovic M. FlexiTaint: A programmable accelerator for dynamic taint propagation. In: Carter J, ed. Proc. of the 14th Int'l Syrup. on High Performance Computer Architecture (HPCA). New York: ACM Press, 2008. 173-184. Idol: 10.1109/HPCA.2008.46S8637].

共引文献184

同被引文献76

引证文献14

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部