期刊文献+

一种面向Trace与漏洞验证的污点分析方法 被引量:2

A Taint Analysis Approach for Trace and Vulnerability Validation
下载PDF
导出
摘要 静态分析方法被广泛用于Android应用的隐私泄露检测,其以(Source,Sink)对形式检测潜在漏洞,但同时会产生大量虚警。针对该问题,提出一种上下文敏感和域敏感的污点分析方法。对污点传播的操作语义和一致性约束进行形式化定义,保证污点传播的语义正确性,同时分析插桩运行Android应用后产生的Trace片段,验证漏洞是否存在虚警。基于Soot实现原型系统并对DroidBench数据集中的70个应用进行分析,实验结果表明,该方法可成功验证4个虚警并发现8个漏报,表明其能有效判断静态分析结果的正确性。 Static analysis methods are widely used to detect privacy leaks in the Android applications and potential bugs are detected by the form of(Source,Sink),but many false alarms are generated as well.To address the problem,this paper proposes a context-sensitive and field-sensitive taint analysis approach.The operational semantics of taint propagation and the consistent constraints are formally defined to ensure taint propagation to be semantically correct.Trace segments generated after instrumenting and running an Android applications is also analyzed to verify if a potential bug is really true.A prototype system is implemented based on Soot and tested on seventy applications from the DroidBench dataset.Experimental results show that the proposed method can successfully verified four false positives and found eight false negatives,demonstrating that the proposed method is capable of verifying the correctness of static analysis results.
作者 秦彪 郭帆 杨晨霞 QIN Biao;GUO Fan;YANG Chenxia(College of Computer Information Engineering,Jiangxi Normal University,Nanchang 330022,China;Department of Computer Science,Yuzhang Normal University,Nanchang 330105,China)
出处 《计算机工程》 CAS CSCD 北大核心 2020年第5期157-166,共10页 Computer Engineering
基金 国家自然科学基金(61562040) 江西省教育厅科学技术研究项目(GJJ161305,GJJ151330)。
关键词 污点分析 上下文敏感 域敏感 污点传播 形式化定义 taint analysis context sensitivity field sensitivity taint propagation formal definition
  • 相关文献

参考文献4

二级参考文献30

  • 1景涛,江昌海,胡德斌,白成刚,蔡开元.软件关联缺陷的一种检测方法[J].软件学报,2005,16(1):17-28. 被引量:23
  • 2Binkley D. Source code analysis: A road map I-C] //Proc of the Future of Software Engineering. Piscataway, NJ: IEEE, 2007: 104-119.
  • 3Rice H. Classes of recursively enumerable sets and their decision problems [J]. Transactions of the American Mathematical Society, 1953, 74(2): 358-366.
  • 4Le W, Soffa M L. Path-based fault correlations [C]//International Symp on Foundations of Software Engineering. New Yorkz ACM, 2010:307-316.
  • 5Clarke E, Grumberg O, Jha S, et al. Counter example- guided abstraction refinement [C]//Proe of the 12th International Conf on Computer Aided Verification. Berlin: Springer, 2000:154-169.
  • 6Weiser M. Program slicing [C] //Proc of Int Conf on Software Engineering. Piscataway, NJ: IEEE, 1981:439- 449.
  • 7Silva J. A vocabulary of program slicing-based techniques [OL]. [2012-03-19]. http://users, dsic. upv. es/- jsilva/ papers/Vocabulary, pdf.
  • 8Jeannet B, Mine A. Apron: A library of numerical abstract domains for static analysis [C] //Proc of the 21st Int Conf on Computer Aided Verification. Berlin Springer, 2009: 661- 667.
  • 9Mine A. The octagon abstract domain [J]. Higher-Order and Symbolic Computation, 2006, 19(1): 31-100.
  • 10King J. Symbolic execution and program testing [J]. Communications of the ACM, 1976, 19(7):385-394.

共引文献61

同被引文献12

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部