期刊文献+

基于约束推导式的增强型二进制漏洞挖掘 被引量:4

Enhanced Binary Vulnerability Mining Based on Constraint Derivation
下载PDF
导出
摘要 近年来,使用软件相似性方法挖掘软件中的同源漏洞已经被证明确实有效,但现有的方法在准确率方面还存在一定不足。在原有的软件相似性方法的基础上,文中提出了一种基于约束推导式的增强型相似性方法。该方法引入代码规范化和标准化处理技术以减少编译环境引起的噪声,使得同源程序在不同编译条件下的反编译代码表示尽量趋于相同;使用程序后向切片技术提取漏洞函数和漏洞补丁函数的约束推导式,通过两者约束推导式的相似性比较,过滤掉易被误判为漏洞函数的补丁函数,以减少漏洞挖掘结果中的误报。基于所提方法,实现了新的漏洞挖掘系统VulFind。实验结果表明,该系统可以提升软件相似性分析的准确率,使得漏洞挖掘结果的准确率得到有效提升。 In recent years,using software similarity methods to mine the homologous vulnerabilities has been proved to be effective,but the existing methods still have some shortcomings in accuracy.Based on the existing software similarity methods,this paper proposes an enhanced similarity method based on constraint derivation.This method uses code normalizationand standardization to reduce the compilation noise,so that the decompiled code representations of homologous programs tend to be the same under different compilation conditions.By using the backward slicing technique,it extracts the constraint derivation of vulnerability function and vulnerability patch function.By comparing the similarity of two constraint derivations,the patch function that is easily misjudged as vulnerability function is filtered out,so as to reduce false positives of vulnerability miningresults.We implement a prototype called VulFind.Experimental results show that VulFind caneffectivelyimprove the accuracy of software similarity analysis and vulnerability mining results.
作者 郑建云 庞建民 周鑫 王军 ZHENG Jian-yun;PANG Jian-min;ZHOU Xin;WANG Jun(State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou 450002,China)
出处 《计算机科学》 CSCD 北大核心 2021年第3期320-326,共7页 Computer Science
基金 国家自然科学基金(61802433 61802435) 之江实验室(2018FD0ZX01)。
关键词 二进制代码分析 漏洞挖掘 软件相似性 代码规范化 约束推导式 Binary code analysis Vulnerability mining Software similarity Code normalization Constraint derivation
  • 相关文献

参考文献4

二级参考文献76

  • 1曹羽中,金茂忠,刘超.克隆代码检测技术综述[J].计算机工程与科学,2006,28(z2):9-13. 被引量:6
  • 2Bilenko M,Mooney R J.Adaptive duplicate detection using learnable string similarity measure[C] ∥Proceeding of ninth ACM SIGKDD international conference on Knowledge disco-very and data mining.2003:39-48,.
  • 3Baker B S.On finding duplication and near duplication in large software systems[C] ∥Proceedings of 2nd Working Conference on Reverse Engineering.1995:86-95.
  • 4Mayrand J,Leblanc C,Merlo E M.Automatic detection of function clones in a software system using metrics[C] ∥Proceeding of International Conference on Software Maintenance (ICSM).1996.
  • 5Rieger M.Effective clone detection without language barriers[D].Bern University,Switzerland,2005.
  • 6Georgina C,Mike J.Source-code plagiarism:A UK academic perspective[R].RR-422.Department of computer Science,University of Warwick,2006.
  • 7Sheard J,Dick M,Markham S,et al.Cheating and plagiarism:perceptions and practices of first year it students[C] ∥Procee-dings of the 7th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education.2002:183-187.
  • 8McCabe D.Levels of Cheating and Plagiarism Remain High[OL].Center for Academic Integrity.Duke University,2005.http://academicintegrity.org.
  • 9Halstead,Howard M.Elements of Software Science[Z].Elsevier,1977.
  • 10Ottenstein K J.An Algorithmic Approach to the Detection and Prevention of Plagiarism[J].SIGCSE Bulletin,1977,8(4):30-41.

共引文献102

同被引文献35

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部