期刊文献+

面向资源泄漏的浏览器沙箱测试方法

A Resource-Leakage Oriented Browser Sandbox Testing Method
下载PDF
导出
摘要 资源泄漏是导致浏览器沙箱逃逸的重要缺陷之一,已有浏览器沙箱测试方法不完全适用于发现资源泄漏缺陷.基于大多数导致沙箱逃逸的资源具有相同或相似属性取值的分析,本文提出了一种面向资源泄漏的浏览器沙箱测试方法.该方法首先分析并约简敏感资源的属性来生成资源筛选规则;其次,定义资源与资源筛选规则前件的最大加权语义相似度为逃逸指数,并使用逃逸指数阈值来筛选测试资源;再次,设计并实现了原型系统BSTS(Browser Sandbox Testing System),并在BSTS内分析了方法的性能.进一步,选择多个主流浏览器沙箱来测试本文方法的资源泄漏发现能力,实验结果显示本文方法具有良好的资源泄漏发现能力. Resource leakage is one of the important defects of sandbox escape. The existing browser sandbox testing methods are insufficient to discover leak resources. Based on the analysis that most leaking resources have same or similar attribute values,this paper designed a resource-leakage oriented browser testing method. The method firstly analyzes resources attributes and creates resource selecting rules; secondly,calculates the escape index of every resource of system and uses threshold to select testing resources; thirdly,designs and implements a prototype system-Browser Sandbox Testing System( BSTS) and analysis the capability of our method; then we select and test some browser sandboxes; in the end,we found an undisclosed resource leakage vulnerability.
出处 《电子学报》 EI CAS CSCD 北大核心 2017年第7期1775-1783,共9页 Acta Electronica Sinica
基金 国家863高技术研究发展计划(No.2012AA012902)
关键词 浏览器沙箱 资源泄漏 粗糙集理论 语义匹配 brow ser sandbox resource leakage rough set theory semantic match
  • 相关文献

参考文献5

二级参考文献46

  • 1Sutton M, Greene A, and Amini P. Fuzzing: Brute Force Vulnerability DiscoveryIM]. New Jersey: Pearson Education, 2007. 被引量:1
  • 2Hocevar S, zzuf--multi-purpose fuzzer[OL], http://caca. zoy. org/wiki/zzuf, 2013. 被引量:1
  • 3Microsoft SDL. MiniFuzz tool[OL], http://technet.microsoft. com/en-us/edge/minifuzz-overview-and-demo.aspx, 2013.3. 被引量:1
  • 4DeMott J, Enbody R, and Punch W F. Revolutionizing the field of grey-box attack surface testing with evolutionary fuzzing[OL], https://www.blackhat .com/html/bh-media- archives/bh-archives-2007.html, 2007. 被引量:1
  • 5Michael Eddington, Peach[OL]. http://peachfuzzer.com. 2013.10. 被引量:1
  • 6Ruijters E. [Master dissertation], Model-checking Markov chains using interval arithmetic[D]. [Master dissertalion], Maastricht University, 2013. 被引量:1
  • 7Godefroid P, Levin M Y and Molnar D. Sage: whitebox fuzzing for security testing[J]. Queue, 2012, 10(1): 20. 被引量:1
  • 8Molnar D A and Wagner D. Catchconv: symbolic executionand run-time type inference for integer conversion errors[R]. EECS Department, University of California, Berkeley, Technical Report No. UCB/EECS-2007-23, 2007. 被引量:1
  • 9Balakrishnan G, Gruian R, and Reps T. CodeSurfer/x86- a platform for analyzing x86 executables[C]. Compiler Construction. Springer Berlin Heidelberg, 2005: 250-254. 被引量:1
  • 10Wang T, Wei T, Gu G, et al.. TaintScope. a checksum-aware directed fuzzing tool for automatic software vulnerability detection[C]. 2010 IEEE Symposium on Security and Privacy (SP), Oakland, USA, 2010: 497-512. 被引量:1

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部