期刊文献+

基于协议逆向的移动终端通信数据解析 被引量:1

Analysis of communication data of mobile terminal based on protocol reversal
下载PDF
导出
摘要 针对移动终端通信协议及通信数据的解析,其难点在于大部分移动终端应用程序并无相关公开的技术文档,难以获知其采取的通信协议类型。指令执行序列分析技术通过分析程序执行的指令序列逆向推断出消息格式和状态机。但有时序列信息采集不全,导致状态机推断不完备,从而无法获取全部协议信息。针对上述问题,提出了一个新型的基于状态机对比推断分析的移动终端通信协议解析方案,可用于取证场景提高数据取证的准确性和完备性。该方案首先利用PIN动态二进制插桩,识别污点源并跟踪污点轨迹分析出协议消息格式;然后根据格式信息对提取的协议消息进行聚类分析推断出原始状态机;最后利用最长公共子序列(LCS, longest common subsequence)算法与已知的协议状态机进行对比,相似度最高者即为推断出的通信协议类型。在Android平台上基于两类应用程序设计实验对该方案进行测试和评估,实验结果表明可准确提取应用程序的通信内容,实用价值强。 The most problem in analysis of communication protocols and communication data for mobile terminals is that many mobile applications do not have the relevant public technical documents,and it is difficult to know the type of communication protocol it adopts.The instruction execution sequence analysis technique takes the instruction sequence executed by the program as a research object,and inversely infers the message format and the state machine to obtain the communication protocol.However,due to the incomplete collection of sequence information,the state machine infers that the inference is incomplete and cannot be effective.A novel protocol reverse scheme based on state machine comparison is proposed,which can be used for the forensics of mobile terminal communication data.The scheme first uses PIN for dynamical identification of the taint,and track it and analyzes the trajectory to obtain the message format.Secondly,the message clustering is performed on the basis of the message format to infer the protocol state machine.Finally,the LCS algorithm is used to compare the state machines to get a complete protocol state machine.This article tests and evaluates the scheme based on two types of application design experiments on the Android platform.The experimental results show that the results are both complete and real-time,and have practical value.
作者 张明远 祁欣妤 宋宇波 顾荣荣 胡爱群 朱珍超 ZHANG Mingyuan;QI Xinyu;SONG Yubo;GU Rongrong;HU Aiqun;ZHU Zhenchao(The State Radio Monitoring Center Testing Center, Beijing 100041, China;School of Cyber Science and Engineering South East University, Nanjing 211189, China)
出处 《网络与信息安全学报》 2018年第12期54-61,共8页 Chinese Journal of Network and Information Security
基金 国家自然科学基金资助项目(No.61601113) 中央高校基本科研业务费专项基金资助项目(No.2242017K40013)~~
关键词 移动终端 数据取证 动态污点分析 协议逆向分析 相似性对比 mobile terminal data forensics dynamic stain analysis protocol reverse analysis similarity comparison
  • 相关文献

参考文献2

二级参考文献9

  • 1Ukkonen E.On-line Construction of Suffix Trees[J].Algorithmica,1995,14(3):249-260.
  • 2Chi L,Hui K.Color Set Size Problem with Applications To String Matching[C]//Proceedings of the 3rd Symposium on Combinatorial Pattern Machine.Berlin,Germany:Springer,1992:230-243.
  • 3Mac Queen J B.Some Methods for Classification and Analysis of Multivariate Observations[C]//Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability.Berlin,Germany:Springer,1967:281-297.
  • 4Fischer J,Heun V.Theoretical and Practical Improvements on the RMQ-problem with Applications to LCA and LCE[C]//Proceedings of the 17th Annual Sympo-sium on Combinatorial Pattern Matching.Berlin,Germany:Springer,2006:36-48.
  • 5Poison Ivy 2.3.2 C&C Server Buffer Overflow[EB/OL].(2012-07-06).http://www.exploit-db.com/exploits/19613/.
  • 6张帅.对APT攻击的检测与防御[J].信息安全与技术,2011,2(9):125-127. 被引量:28
  • 7刘豫,聂眉宁,苏璞睿,冯登国.基于可回溯动态污点分析的攻击特征生成方法[J].通信学报,2012,33(5):21-28. 被引量:6
  • 8陈剑锋,王强,伍淼.网络APT攻击及防范策略[J].信息安全与通信保密,2012,10(7):24-27. 被引量:30
  • 9林龙成,陈波,郭向民.传统网络安全防御面临的新威胁:APT攻击[J].信息安全与技术,2013,4(3):20-25. 被引量:25

共引文献16

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部