期刊文献+

识别数据结构的协议格式逆向推理方法 被引量:2

Reverse engineering of protocol format via identifying program data structures
原文传递
导出
摘要 针对现有协议格式逆向方法在现实中复杂语义环境下存在的逆向准确度不高的问题,抓住"协议结构与代码数据结构之间的协同映射"这一规律,提出了识别数据结构的协议格式逆向方法,利用细粒度的污点追踪,记录并分析协议在动态执行中的内存访问,通过在内存中追踪基址捕获与输入中不同字段相对应的数据结构,最后基于数据结构的独立性,逆向分析协议中的字段等格式信息.实验结果表明,与以协议字段在解析过程被当作一个整体访问为前提的传统方法相比,所提出的方法可以有效地识别出协议中的数据结构,从而更准确地逆向推理出协议格式. To address the accuracy problem of current techniques due to the complex program semantics, we propose a reversing technique based on the mapping relationship between the protocol format and pro- gram data structures. By fine-grained dynamic taint tracking, we analyze the execution contexts and mem- ory segments for each tainted bytes, identify the base memory address, and identify fields via independent program data structure. The results of experiment show that compared with current techniques which based on the observation that one field of input should be accessed as one unit; this technique identifies da- ta structures in protocol effectively, so as to get protocol format more accurately.
出处 《武汉大学学报(工学版)》 CAS CSCD 北大核心 2015年第2期269-273,288,共6页 Engineering Journal of Wuhan University
基金 国家自然科学基金资助项目(编号:61303213 61373169) 中国博士后科学基金资助项目(编号:2014M562059)
关键词 软件安全 协议逆向 细粒度污点 software security protocol reversing fine-grained dynamic tainting
  • 相关文献

参考文献12

  • 1Slowinska A,Stancescu T,Bos H.Body armor for binaries:preventing buffer overflows without recompilation[C]//Proceedings of 2012USENIX Annual Technical Conference,Boston:USENIX Association,2012. 被引量:1
  • 2Comparetti P,Wondracek G,Kruegel C,et al.Prospex:Protocol specification extraction[C]//Proceedings of IEEE Symposium on Security and Privacy,Oakland:IEEE Computer Society Press,2009:110-125. 被引量:1
  • 3Lin Z,Zhang X.Reverse engineering input syntactic structure from program execution and its applications[J].IEEE Trans.Softw.Eng.,2010,36(5):688-703. 被引量:1
  • 4Wang T,Wei T,Gu G,et al.TaintScope:A checksum-aware directed fuzzing tool for automatic software vulnerability detection[C]//Proceedings of IEEE Symposium on Security and Privacy,Oakland:IEEE Computer Society Press,2010:497-512. 被引量:1
  • 5Lin Z,Jiang X,Xu D,et al.Automatic protocol format reverse engineering through context-aware monitored execution[C]//Proceedings of Network and Distributed System Security Symposium,San Diego:Internet Society(ISOC),2008. 被引量:1
  • 6Caballero J,Yin H,Liang Z,et al.Polyglot:Automatic extraction of protocol message format using dynamic binary analysis[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York:ACM Press,2007:317-329. 被引量:1
  • 7Cui W,Peinado M,Chen W,et al.Tupni:automatic reverse engineering of input formats[C]//Proceedings of the 15th ACM Conference on Computer and Communications Security.Alexandria:ACM Press,2008:391-402. 被引量:1
  • 8Slowinska A,Stancescu T,Bos H.Howard:A dynamic excavator for reverse engineering data structures[C]//2011 Network and Distributed System Security Symposium.San Diego,2011. 被引量:1
  • 9Lin Z,Zhang X,Xu D.Automatic reverse engineering of data structures from binary execution[C]//Proceedings of the 17th Network and Distributed System Security Symposium,San Diego:Internet Society(ISOC),2010. 被引量:1
  • 10Song D,Brumley D,Yin H.BitBlaze:A new approach to computer security via binary analysis[C]//Proceedings of the 4th International Conference on Information Systems Security(ICISS 2008).Hyderabad:IEEE CS Press,2008:1-25. 被引量:1

同被引文献11

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部