首页 | 本学科首页   官方微博 | 高级检索  
   检索      

软件漏洞分析中的脆弱点定位方法
引用本文:蔡军,邹鹏,杨尚飞,何骏.软件漏洞分析中的脆弱点定位方法[J].国防科技大学学报,2015,37(5):141-148.
作者姓名:蔡军  邹鹏  杨尚飞  何骏
作者单位:装备学院 复杂电子系统仿真实验室,装备学院 复杂电子系统仿真实验室,海军装备研究院,装备学院 复杂电子系统仿真实验室
基金项目:国家高技术研究发展计划(863计划);国家科技攻关计划
摘    要:针对二进制程序漏洞成因复杂难以分析的问题,提出运用污点分析的软件脆弱点定位方法,并实现了一个工具原型Sword Checker。以动态污点追踪为基础,依据漏洞模式通过特征匹配来定位软件中的脆弱点,运用二分查找定位影响脆弱点的敏感字节。实验表明,使用Sword Checker能够精确快速识别定位软件中三种类型的脆弱点,已成功分析了多个已公开漏洞的成因,并已辅助挖掘出几个未公开漏洞。

关 键 词:污点分析  脆弱点定位  二分查找
收稿时间:2014/12/31 0:00:00

Vulnerable spots localization methods for software vulnerability analysis
CAI Jun,ZOU Peng,YANG Shangfei and HE Jun.Vulnerable spots localization methods for software vulnerability analysis[J].Journal of National University of Defense Technology,2015,37(5):141-148.
Authors:CAI Jun  ZOU Peng  YANG Shangfei and HE Jun
Institution:1.Science and Technology on Complex Electronic System Simulation Laboratory, Academy of Equipment, Beijing 101416, China,1.Science and Technology on Complex Electronic System Simulation Laboratory, Academy of Equipment, Beijing 101416, China,2. Naval Academy of Armament, Beijing 100161, China and 1.Science and Technology on Complex Electronic System Simulation Laboratory, Academy of Equipment, Beijing 101416, China
Abstract:Software vulnerability is currently a hot topic in the field of information security. Although many achievements have been made in the research of vulnerability mining at home and abroad, with a lot of automatic vulnerability mining tools such as fuzzers come out, but the analysis of causes of vulnerabilities is still using manual analysis due to the lack of automatic analysis tool. Aiming at the difficulty in analysis of binary program vulnerabilities, we propose an approach for software vulnerable spots localization based on taint analysis, and implement a corresponding tool named SwordChecker. This method is based on dynamic taint tracing. It localizes software vulnerable spots by character matching according to vulnerability patterns, and localizes sensitive bytes of user input which affects the vulnerable spots by binary-search. Experiment results show that SwordChecker can accurately identify and localize three types of software vulnerable spots fast, has successfully analyzed the causes of multiple open vulnerabilities, and has assisted mining several undisclosed vulnerabilities.
Keywords:taint analysis  vulnerable points localization  binary-search
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《国防科技大学学报》浏览原始摘要信息
点击此处可从《国防科技大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号