期刊文献+

面向漏洞类型的Crash分类研究 被引量:1

Research on Crash Classification for Vulnerability Types
下载PDF
导出
摘要 Crash(程序崩溃)分析是漏洞挖掘与利用的关键阶段,判定Crash是由何种类型漏洞产生的是进行Crash分析和漏洞利用的前提。针对现有漏洞检测平台无法有效识别Crash类型的问题,提出一种二进制可执行程序漏洞检测和Crash类型判定的方法。该方法通过对二进制可执行程序Fuzz出的Crash进行污点标记,在污点传播阶段兼顾污点清除、间接污染等污点传播规则,在污点检查阶段通过收集崩溃点上下文信息,匹配多种漏洞触发规则。基于上述方法开发出对二进制程序漏洞检测和判定Crash所属漏洞类型的原型系统,实验结果表明,该方法适用于栈溢出、格式化字符串、堆溢出等漏洞导致的覆盖返回地址、函数指针等模式,具有较高准确率。 Crash analysis is a critical stage in exploitation and utilization of vulnerabilities.It’s prerequisite for Crash analysis and exploitation to determine what types of vulnerabilities are caused by crashes.In view of the problem that the existing vulnerability detection platform cannot effectively identify the Crash type,binary executable vulnerability detection and Crash type determination method is designed.The method performs taint marking on the Crash of the binary executable program,and takes care of taint removal and indirect pollution in the taint propagation stage.The purpose is to collect Crash point context information during the taint check phase to match multiple vulnerability triggering rules.Based on the above method,a tool for detecting vulnerability in a binary program and determining the type of Crash is developed.The experimental results show that the method is suitable for overwrite return address,function pointer and other modes caused by vulnerabilities such as stack overflow,format string and heap overflow.
作者 代培武 潘祖烈 施凡 DAI Peiwu;PAN Zulie;SHI Fan(College of Electronic Engineering,National University of Defense Technology,Hefei 230000,China)
出处 《计算机工程与应用》 CSCD 北大核心 2020年第13期124-130,共7页 Computer Engineering and Applications
基金 安徽省自然科学基金(No.1908085QF291)。
关键词 Crash分析 漏洞检测 二进制插桩 动态污点分析 Crash analysis vulnerability detection binary instrumentation dynamic taint analysis
  • 相关文献

参考文献8

二级参考文献43

  • 1李剑慧,马湘宁,朱传琪.动态二进制翻译与优化技术研究[J].计算机研究与发展,2007,44(1):161-168. 被引量:26
  • 2CadarC, GaneshV, PawlowskiPM, et al. EXE: Automatically Generating Inputs of Death[C]//Proc of the 13th ACM Conf on Computer and Communications Security, 2006:322- 335. 被引量:1
  • 3Cadar C, Dunbar D,Enqler D. Klee: Unassisted and Automatic Generation of High Coverage Yests for Complex Systems Programs[C]//Proc of OSDI'08,2008. 被引量:1
  • 4Godefroid P, Klarlund N, Sen K. Dart: Directed Automated Random Testing[J]. ACM SIGPI.AN Notices, 2005,40(6):213-223. 被引量:1
  • 5Godeiroid P, Levin M Y, Molnar D A. Automated Whitebox Fuzz Testing[C]//Proc of the 2008 Network and Distributed System Security Symposium, 2008. 被引量:1
  • 6Sen K, Marinov D, Agha G. Cute: A Concolicunit Testing Engine for C[C]//Proc of the l Oth European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005:263-272. 被引量:1
  • 7Bacon D F, Graham S L, Sharp O J. Compiler Transforma tions for High-Performance Computing[J]. ACM Computing Surveys, 1994,26(4) :345-420. 被引量:1
  • 8Ku K, Hart T E, Chechik M, et al. A Buffer Overflow Benchmark for Software Model Checkers[C]//Proc of the 22nd IEEE/ACM International Conference on Automated Software Engineering, 2007 : 389-392. 被引量:1
  • 9Luk C K,Cohn R,Muth R,et al.Pin:building customized program analysis tools with dynamic instrumentation[J].ACM Sigplan Notices,2005,40(6):190-200. 被引量:1
  • 10Back M,Charney M,Cohn R,et al.Analyzing parallel programs with Pin[J].Computer,2010,43(3):34-41. 被引量:1

共引文献36

同被引文献6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部