期刊文献+

基于SEH的漏洞自动检测与测试用例生成 被引量:3

Automatic Vulnerability Detection and Test Cases Generation Method for Vulnerabilities Caused by SEH
下载PDF
导出
摘要 SEH即结构化异常处理,是Windows操作系统提供给程序设计者处理程序错误或异常的途径。然而SEH的链式处理方式使得程序中可能存在相应漏洞。针对该问题,为提升程序安全性,提出一种基于SEH的漏洞自动测试用例生成方法。首先判断程序是否存在基于SEH被攻击的漏洞风险性,若存在则构建和调整测试用例约束,并自动求解生成相应测试用例。该方法一方面扩展了当前的自动测试用例生成模式,另一方面可在GS保护开启时仍能生成有效测试用例。最后通过实验验证了该方法的有效性。 Structured Exception Handling(SEH),which offered by Windows operating system,is a way to handle program errors or exceptions.However,while SEH handles exception based on link,there may be corresponding vulnerabi-lities.To solve this problem,in order to improve program security,a method was proposed to generate test cases base on SEH.First,the method judge whether the program has the risk of being attacked based on the SEH.If there is a risk,the test case constraints are constructed and adjusted.Then by solve these constraints,the corresponding test cases are generated automatically.On the one hand,this method extends the current automatic test case generation pattern.And on the other hand,it can generate effective test cases even when GS protection is turned on.Finally,the effectiveness of the method is verified by experiments.
作者 黄钊 黄曙光 邓兆琨 黄晖 HUANG Zhao;HUANG Shu-guang;DENG Zhao-kun;HUANG Hui(National University of Defense Technology,Hefei 230037,China)
机构地区 国防科技大学
出处 《计算机科学》 CSCD 北大核心 2019年第7期133-138,共6页 Computer Science
基金 国家重点研发计划“网络空间安全”重点专项(2017YFB0802905)资助
关键词 结构化异常处理 符号执行 自动测试用例生成 Structured exception handling Symbolic execution Automatic test cases generation
  • 相关文献

参考文献6

  • 1林桠泉..漏洞战争 软件漏洞分析精要[M].北京:电子工业出版社,2016:586.
  • 2徐有福,张晋含,文伟平.Windows安全之SEH安全机制分析[J].信息网络安全,2009(5):47-50. 被引量:5
  • 3和亮,苏璞睿.软件漏洞自动利用研究进展[J].中国教育网络,2016(2):46-48. 被引量:10
  • 4吴世忠,郭涛,董国伟著..软件漏洞分析技术[M].北京:科学出版社,2014:520.
  • 5张羽丰..符号执行可扩展性及可行性关键技术研究[D].国防科学技术大学,2013:
  • 6王清主编..0day安全 软件漏洞分析技术[M].北京:电子工业出版社,2011:754.

二级参考文献10

  • 1齐雷,谢余强,程东年,舒辉.Win32 SEH异常处理机制分析[J].信息工程大学学报,2004,5(2):49-52. 被引量:3
  • 2彭建山,吴灏.Windows Vista内存保护关键技术研究[J].计算机工程与科学,2007,29(12):33-36. 被引量:9
  • 3C.Miller, J.Caballero, N.M.Johnson, M.G.Kang, S.McCamanl, P.Poosankam and D.Song. Crash AflIllYSJ:i with HI/Blaze. BlackHat, 2010. 被引量:1
  • 4S.HeeJan and D.Kroening. Automatic Cenerotion of Control Flow Hi'lJcl(/ilg Explo.its for Software Vu/nera.hJlilies. MSc Computer Science Dissertation, University of Oxford, 2009. 被引量:1
  • 5D.Brumley, P.Poosankam, D.song and J.Zheng. A utometrc Patch-Based Exploi/ Genera/ion is Possible: Techniques and Implications. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2008. 被引量:1
  • 6T.Avgerinos, S.K.Cha, RL.T.Tao and D.Brumley.AEC: Automstic Explo.it Geoereuon, In Proceedings of the Network and Distributed System Security Symposium (NDSS), 20 II. 被引量:1
  • 7S.K.Cha, T.Avgerinos, A.Rebert and D.BrumJey. Ullleashing ,If A YHJ:,'A{ 011 Hinary Code. In Proceedings of the IEEE: Symposium on Security and Privacy (S&P). 2012. 被引量:1
  • 8M.H.Wang, P.R.Su, Q.Li, L.Y.Ying, Y.Yang and D.G.Peng. Automatic Polymorphic Exploit Generation for Software Vulnerabilities. In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm),2013. 被引量:1
  • 9Ecl.Schwarte. T.Avgerinos and D.Brumley. Q: ExplOIt hardening made easy. In Proceedings of the USENIX Security Symposium, 2011. 被引量:1
  • 10H.Hu, Z.L.Chua, S.Adrian, P.Saxena and Z.K.Liang. Aut omet ic Gencrsrion of Data-Oriented Exploits. l n Proceedings of the USENIX Security Symposium, 2015. 被引量:1

共引文献13

同被引文献24

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部