期刊文献+

二进制代码的漏洞挖掘技术研究 被引量:4

Research on Binary Programs Vulnerability Mining Technology
下载PDF
导出
摘要 基于网络信息安全漏洞问题越来越受重视,针对漏洞研究中测试代码覆盖率和漏洞挖掘效率问题,设计并实现了基于混合符号执行的Fuzzing测试系统;该系统采用了指令动态追踪、混合符号执行、约束求解、测试用例生成及动态测试5个模块,通过对系统各个环节优化处理提高效率,并实验验证系统代码覆盖率较传统Fuzzing测试工具也有较大提高,得出了该系统能适用于大型应用软件测试的结论。 Worsening of network information security situation makes security vulnerabilities more and more being attentioned.In order to improve test code coverage and vulnerability mining efficiency,a Fuzzing test system based on concolic symbolic execution is designed and implemented.System is mainly composed of dynamic trace,symbolic execution,constraint solving,test case generation and dynamic testing of five modules.In order to improve the testing efficiency,all aspects of system are optimized as far as possible.And by experimental verifi cation,The code coverage of this system is improved greatly than traditional fuzzing testing tools.It is proved that the system can effectively find the exception exist in sample program,and can also be used for large applications software testing.
作者 邢玉凤
出处 《计算机测量与控制》 北大核心 2014年第12期4111-4114,4117,共5页 Computer Measurement &Control
基金 云南省教育厅科学研究基金项目(2013C155)
关键词 混合符号执行 FUZZING测试 代码覆盖率 conclic symbolic execute Fuzzing test code coverage
  • 相关文献

参考文献6

  • 1国鹏飞..基于动态符号执行的二进制代码漏洞挖掘系统研究与设计[D].北京邮电大学,2011:
  • 2庞威,吕晓峰,姚成柱,马羚.基于遗传二进制粒子群混合算法的测试点决策研究[J].计算机测量与控制,2014,22(1):149-151. 被引量:2
  • 3Oehlert P.Violating assumptions with fuzzing Security & Privacy[J] .IEEE,2005,3 (2):58-62. 被引量:1
  • 4Ganesh V,Dill D L.A decision procedure for bit-vectors and arrays[J] .Computer Aided Verification,2007:519-531. 被引量:1
  • 5Wang T,Wei T,Gu G,et al.TaintScope:A checksum-aware directed fuzzing tool for automatic software vulnerability detection[J] .Security and Privacy,2010:497-512. 被引量:1
  • 6康凯..二进制应用程序漏洞挖掘技术研究[D].北京邮电大学,2013:

二级参考文献7

共引文献1

同被引文献38

引证文献4

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部