期刊文献+

基于Hash缓存的细粒度污点分析优化方法 被引量:1

Optimizing Fine-Grained Taint Analysis Based on Hash Cache
下载PDF
导出
摘要 细粒度污点分析过程中污点标签之间的集合运算占据很大的性能开销。为消除集合运算过程中的重复操作,提出一种基于Hash缓存的细粒度污点分析优化方法。在使用ro BDD实现集合表达的同时,添加Hash结构缓存集合运算结果,避免重复运算。实验表明优化后方法能够有效降低细粒度污点分析过程中污点标签之间的集合运算次数,缩短污点分析过程的集合运算时间。 In fine-grained taint analysis,a lot of performance expenses are caused by the set operations between taint tags.To eliminate some repeated operations among them,one method of optimization method based on Hash cache is proposed.By adding a Hash structure to cache the operation results at the same time of using ro BDD for set expression,some repeated set operations can be avoided.The experiments show that,this method can effectively reduce the frequency of set operations between taint tags during fine-grained taint analysis and decrease the time caused by set operations in the overall process.
机构地区 信息工程大学
出处 《信息工程大学学报》 2017年第5期607-612,共6页 Journal of Information Engineering University
基金 国家863计划资助项目(2012AA012902)
关键词 程序分析 细粒度污点分析 Hah缓存 集合运算 program analysis fine-grained taint analysis Hash cache set operation
  • 相关文献

参考文献7

二级参考文献54

  • 1邵林,张小松,苏恩标.一种基于fuzzing技术的漏洞发掘新思路[J].计算机应用研究,2009,26(3):1086-1088. 被引量:17
  • 2崔尚森,张白一.一种基于哈希表和Trie树的快速IP路由查找算法[J].计算机工程与应用,2005,41(9):156-158. 被引量:7
  • 3程光,龚俭,丁伟,徐加羚.面向IP流测量的哈希算法研究[J].软件学报,2005,16(5):652-658. 被引量:54
  • 4SUKaile LüGuanfeng CHENQingliang.Knowledge structure approach to verification of authentication protocols[J].Science in China(Series F),2005,48(4):513-532. 被引量:4
  • 5Newsome J, Song D. Dynamic taint analysis: automatic detection, analysis, and signature gener- ation of exploit attacks on commodity software // Proceedings of the Network and Distributed Systems Security Symposium. San Diego, CA: ISOC, 2005: 134-150. 被引量:1
  • 6Sharif M, Lanzi A, Giffin J, et al. Automatic reverse engineering of Malware emulators // The 2009 IEEE Symposium on Security and Privacy. Oakland: IEEE, 2009:94-109. 被引量:1
  • 7Wang Tielei, Wei Tao, Gu Guofei, et al. Taintscope: a checksum-aware directed fuzzing tool for auto- maticsoftware vulnerability detection // Proceedings of the 31 st IEEE Symposium on Security and Privacy. Oakland: IEEE, 2010:497-512. 被引量:1
  • 8Caballero J, Yin H, Liang Z, et al. Polyglot: automatic extraction of protocol message format using dynamic binary analysis// 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007:317-329. 被引量:1
  • 9Cui W, Peinado M, Chen K, et al. Tupni: automaticreverse engineering of input formats // Proceedings of the 15th ACM Conference on Computer and Communications Security. New York: ACM, 2008:391-402. 被引量:1
  • 10Sharif M, Lanzi A, Giffin J, et al. Panorama: capturing system-wide information flow for malware detection and analysis // Proceedings of the 14th ACMConference on Computer and Communications Security. New York: ACM, 2007:116-127. 被引量:1

共引文献28

同被引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部