期刊文献+

基于隐式模式的输入验证漏洞挖掘技术研究

Research on the Mining Technology of Input Verification Vulnerability Based on Implicit Model
下载PDF
导出
摘要 输入验证漏洞可能是由于程序完整性影响控制流或者数据流输入数据进行验证或处理不当导致漏洞出现。针对Android应用输入验证漏洞提出基于源代码分析静态挖掘方案,使用后向程序切片算法在控制流图上提取事务切片和约束切片,通过频繁模式挖掘获得切片级隐式安全规范,验证规范并将违规现象报告为可疑漏洞,根据收集的路径约束条件推断输入取值范围,自动化生成测试用例并在虚拟机上半自动的验证漏洞报告。实现了原型系统,从源代码中有效地提取出隐式安全规范并挖掘漏洞,通过自动化验证显著降低误报率。 Input validation vulnerabilities may result in vulnerabilities due to procedural integrity affecting control flow or data flow data validation or improper handling.In this paper, a static mining scheme based on source code analysis is proposed for the Android application input verification vulnerability. The transaction slice and constraint slice are extracted from the control flow graph using the back program slicing algorithm.Through the frequent pattern mining, we obtain sectioning level implicit security speeification,verify the specification and report the violation phenomenon as a suspicious vulnerability.Inferring the input range based on the collected path eonstraints, automatically generating test cases and verifying the vulnerability reports on the virtual machine automatieally.A prototype system is implemented to extract implicit security rules from source code and mine vulnerabilities, which significantly reduces false positive rate through automated verification.
作者 侯枫 赵倩 HOU Feng(SanmenxiaPolytechnic,Sanmenxia 472000,China)
出处 《三门峡职业技术学院学报》 2018年第3期121-126,共6页 Journal of Sanmenxia Polytechnic
关键词 隐式 输入验证漏洞 静态分析 程序切片 Implicit Input validation vulnerability Static analysis Program slicing
  • 相关文献

参考文献4

二级参考文献71

  • 1Hornyack P,Han S,Jung J,et al.These Aren’t the Droids You’reLooking for:Retrofitting Android to Protect Data from ImperiousApplications[C]//Proc.of CCS’11.Chicago,USA:[s.n.],2011.
  • 2Enck W,Gilbert P,Chun B,et al.TaintDroid:An Informa-tion-flow Tracking System for Realtime Privacy Monitoring onSmartphones[C]//Proc.of OSDI’10.Vancouver,Canada:[s.n.],2010.
  • 3Beresford A R,Rice A,Skehin N,et al.MockDroid:TradingPrivacy for Application Functionality on Smartphones[C]//Proc.ofthe 12th Workshop on Mobile Computing Systems and Appli-cations.Phoenix,USA:[s.n.],2011.
  • 4Enck W,Octeau D,McDaniel P,et al.A Study of AndroidApplication Security[C]//Proc.of the 20th USENIX SecuritySymposium.San Francisco,USA:[s.n.],2011.
  • 5Goldberg I,Wagner D,Thomas R,et al.A Secure Environment forUntrusted Helper Applications(Confining the Wily Hacker)[C]//Proc.of the 6th USENIX UNIX Security Symposium.San Jose,California,USA:[s.n.],1996.
  • 6Sabelfeld A,Myers A C.Language-based Information-flow Secu-rity[J].IEEE Journal on Selected Areas in Communications,2003,21(1):5-19.
  • 7Ligatti J,Bauer L,Walker D.Edit Automata:Enforcement Me-chanisms for Run-time Security Policies[J].International Journalof Information Security,2005,4(1-2):2-16.
  • 8Wang Tielei,Wei Tao,Gu Guofei,et al.TaintScope:A Checksum-aware Directed Fuzzing Tool for Automatic Software VulnerabilityDetection[C]//Proc.of the 31st IEEE Symposium on Security&Privacy.Berkeley,USA:[s.n.],2010.
  • 9Enck W.Defending Users Against Smartphone Apps:Techniquesand Future Directions[C]//Proc.of ICISS’11.Kolkata,India:[s.n.],2011.
  • 10Gilbert P,Chun B,Cox L P,et al.Vision:Automated SecurityValidation of Mobile Apps at App Markets[C]//Proc.of MCS’11.Washington D.C.,USA:[s.n.],2011.

共引文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部