期刊文献+

Crash可利用性分析方法研究综述 被引量:1

Review of Crash Exploitability Analysis Methods
下载PDF
导出
摘要 Fuzzing技术是现阶段用于漏洞挖掘的主流技术,目前绝大多数的软件漏洞都是利用该技术发现的。但是Fuzzing技术存在的一个主要问题是其会产生大量的crash样本,如何对这些crash样本进行快速的分析分类,是当前基于Fuzzing技术进行漏洞挖掘工作所面临的主要问题。针对crash可利用性分析的研究,首先,总结了导致程序crash的原因并对其分析技术发展的现状进行了概述;其次,着重分析了当前利用动态污点分析和符号执行等技术进行crash可利用性判定的4种有效分析方法;最后,对比了这4种方法之间的差异,并探讨了crash可利用性分析技术未来的发展方向及趋势。 Fuzzing technology is the main technology used in the current stage of vulnerability mining,and currently the majority of software vulnerabilities are discovered by using this technology.However,one of the main problems about Fuzzing technology is that it will produce a large number of crash samples,and how to quickly analyze these crash samples is the main problem of using Fuzzing technology for vulnerability mining work.This paper focused on the researches of crash exploitability.Firstly,it summarized the causes of crash and discussed the development status of its analytical technology,and then it seriously analyzed four effective methods of crash availability judgment by using dynamic taint analysis,symbol execution and other techniques.Finally,it compared the differences between the four methods,and explored the future development direction and trend of the crash exploitability analysis techniques.
作者 张婧 周安民 刘亮 贾鹏 刘露平 ZHANG Jing;ZHOU An-min;LIU Liang;JIA Peng;LIU Lu-ping(College of Electronic and Information,Sichuan Universit;Chengdu 610065 ,Chin)
出处 《计算机科学》 CSCD 北大核心 2018年第5期8-14,23,共8页 Computer Science
关键词 Crash分析 可利用性判定 污点分析 符号执行 Crash analysis Exploitable determination Taint analysis Symbolic execution
  • 相关文献

参考文献7

二级参考文献242

  • 1陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(z1):1933-1938. 被引量:115
  • 2刘宗田 朱逸芬.符于执行技术在68000C反编译程序中的应用[J].计算机学报,1988,6:631-637.
  • 3陈凯明 刘宗田.逆编译中按特征恢复数据类型[J].计算机研究与发展,2001,(38):209-213.
  • 4Cifuentes,C.Interprocedural data flow decompilation[J].Journal of Programming Languages,1996,4(2):77~99
  • 5Breuer,P.T*,Bowen,J.P*.Decompilation:the enumerationof types and grammars[J].ACM Transaction on Programming Languages and Systems,1994,16(5):1613~1647
  • 6Kruegel C,Robertson W,Valeur F,et al.Static disassembly of obfuscated binaries[M].Santa Barbara, CA, USA: Reliable Software Group,2004.
  • 7Rolles R.Unpacking virtualization obfuscators[EB/OL]. (2009).http://usenix.org/.
  • 8刘涛涛.扭曲加密变换技术[R].软件安全峰会,2008.
  • 9Newsome J, Song D.Dynamic taint analysis for automatic detection, analysis and signature generation of exploitson commodity software[D].Pittsburgh: Carnegie Mellon University, School of Computer Science, 2005.
  • 10Miller C, Caballero J, Johnson N M.Crash analysis using BitBlaze[C]//Black Hat USA 2010,2010.

共引文献134

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部