期刊文献+

基于漏洞指纹的软件脆弱性代码复用检测方法 被引量:3

Software vulnerable code reuse detection method based on vulnerability fingerprint
下载PDF
导出
摘要 针对传统脆弱性代码复用检测技术漏报率高的问题,提出基于漏洞指纹的检测方法.分析开源项目漏洞补丁的结构与脆弱性代码特征,总结代码复用过程中常见修改手段的特点,设计基于哈希值的漏洞指纹模型.开展代码预处理消除无关因素的影响,选取固定行数的代码块作为特征抽象粒度,利用哈希算法抽取关键代码特征.通过搜集开源项目漏洞信息与相关代码片段构建漏洞样本库,利用基于LCS的相似性评估算法定位漏洞样本的复用并且标记为敏感代码,使用漏洞指纹进行检测并根据识别策略完成对脆弱性代码的判定.实验结果表明,基于漏洞指纹的检测方法能够有效地应对多种代码修改手段的影响,明显提高检测效率,检测时间与输入代码量呈线性增长关系. A detection method for vulnerable code reuse based on vulnerability fingerprint was proposed to reduce the false negative rate of traditional methods.The structure of the vulnerability patch on open source projects and the feature of vulnerable code were analyzed,the common methods of code reuse were summarized and the fingerprint model based on hash value was presented.Code preprocessing was introduced to reduce the influence of irrelevant factors.The code block with fixed line number was used as the basic unit for feature abstraction and the hash algorithm was introduced to extract features from the code.The vulnerability instance database was established by collecting vulnerability details and relevant codes in open source project.The LCS-based similarity measuring method was employed to locate the reuse of the instance and mark them as sensitive codes.Under the instruction of the judging strategy,the vulnerability fingerprint was applied to identify vulnerable code reuse among the sensitive codes accurately.The experimental results showed that the proposed method can deal with the impact of the commonly used code modification methods effectively as well as improve the efficiency obviously,and there was linear dependence between the time cost and the amount of input code.
作者 刘臻 武泽慧 曹琰 魏强 LIU Zhen;WU Ze-hui;CAO Yan;WEI Qiang(State Key Laboratory of Mathematical Engineering and Advanced Computing,Information Engineering University,Zhengzhou 450001,China)
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2018年第11期2180-2190,共11页 Journal of Zhejiang University:Engineering Science
基金 国家重点研发计划基金资助项目(2017YFB0802900)
关键词 软件脆弱性检测 脆弱性代码 漏洞指纹 代码复用 相似性评估 software vulnerability detection vulnerable code vulnerability fingerprint code reuse similarity evaluation
  • 相关文献

参考文献3

二级参考文献39

  • 1Tripathi A. Towards standardization of vulnerability taxonomy. In: Proc. of 2010 the 2nd Int'l Conf. on Computer Technology and Development. 2010. 379-384. [doi: 10.1109/ICCTD.2010.5645826].
  • 2Howard M, LeBlanc D, Viega J, Wrote; Xiao FT, Yang MJ, Trans. 19 Deadly Sins of Software Security Programming Flaws and How to Fix Them. Beijing: Qinghua University Press, 2006 (in Chinese).
  • 3Viega J, Bloch JT, Kohno Y, McGraw G. Its4: A static vulnerability scanner for c and c++ code. In: Proc. of the 16th Annual Computer Security Applications Conf. (ACSAC 2000). Washington: IEEE Computer Society, 2000. [doi: 10.1109/ACSAC.2000. 898880].
  • 4software R. RATs, http://www,securesw,com/rats/.
  • 5Dwheeler. Flawfinder software. 2007. http://sourceforge.net/projects/flawfinder/.
  • 6Aiken A, Bugrara S, Dillig 1. Saturn project, http://saturn.stanford.edu.
  • 7Rose/Compass static analysis tools user manual, http://www.rosecompiler.org/compass.pdf.
  • 8Roy CK, Cordy JR, Koschke R. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Science of Computer Programming, 2009,74(7):470-495. Idol: 10.1016/j.scico.2009.02.007].
  • 9Nguyen TT, Nguyen HA, Pham NH, AI-Kofahi JM, Nguyen TN. Recurring bug fixes in object oriented programs. In: Proc. of the Int'l Conf. on Software Engineering (ICSE 2010). ACM Press, 2010. 315-324. [doi: 10.1145/1806799.1806847].
  • 10Pham NH, Nguyen TT, Nguyen HA, Nguyen TN. Detection of recurring software vulnerabilities. In: Proc. of the Int'l Conf. on Automated Software Engineering. ACM Press, 2010. 447-456. [doi: 10.1145/1858996.1859089].

共引文献26

同被引文献27

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部