期刊文献+

软件漏洞自动化利用综述

Survey of Automatic Software Vulnerability Exploitation
下载PDF
导出
摘要 近年来软件漏洞数目急剧增加,漏洞危害也引起业界广泛关注.准确、高效、快速地编写出漏洞利用代码是漏洞危害性评估和漏洞修复的关键.当前漏洞利用代码主要依赖人工手动分析编写,效率较低.因此,如何实现自动化的漏洞利用代码生成是该领域研究的热点和难点.综述分析了该领域近30年的代表性成果,首先将漏洞自动化利用过程分为典型的4个环节:漏洞根源定位、可达路径搜索、漏洞原语生成、利用代码生成.然后从人机边界、攻防博弈、共性技术3个角度对上述成果进行梳理,明确当前研究的重点、难点,以及取得的阶段性成果.最后从现有成果与技术实用化所面临的差距方面,论述当前研究存在的瓶颈问题、未来的发展趋势,以及下一步的研究重点. In recent years,the number of software vulnerabilities has increased sharply and its harmfulness has aroused widespread concern in society.Compiling vulnerability utilization code accurately,efficiently and quickly is the key to vulnerability damage assessment and vulnerability repairment.At present,the vulnerability exploitation code mainly relies on manual analysis and writing,which is inefficient.Therefore,how to realize automatic vulnerability exploitation code generation(AEG)is a hotspot and difficulty in software security research field.In this paper,we analyze the representative achievements in this field in recent 30 years.Firstly,we divide the vulnerability automatic utilization process into four typical segments:vulnerability root location,reachable path search,vulnerability primitive generation and utilization code generation.After that we sort out and select the typical work of the above achievements from the three perspectives of human-machine boundary,attack and defense game,and common basic technology.And on this basis,we define the key points,difficulties and phased achievements of the current research.Finally,from the gap between the existing achievements and the practical application of automatic exploit generation,we discuss the bottleneck problems existing in the current research,the future development trend of AEG,and the next research points we should focus on.
作者 武泽慧 魏强 王新蕾 王允超 燕宸毓 陈静 Wu Zehui;Wei Qiang;Wang Xinlei;Wang Yunchao;Yan Chenyu;Chen Jing(State Key Laboratory of Mathematical Engineering and Advanced Computing(Strategic Support Force Information Engineering University),Zhengzhou 450001;School of Cyber Science and Engineering,Zhengzhou University,Zhengzhou 450001)
出处 《计算机研究与发展》 EI CSCD 北大核心 2024年第9期2261-2274,共14页 Journal of Computer Research and Development
基金 国家重点研发计划项目(2019QY0501)。
关键词 软件安全 漏洞分析 自动化利用 利用生成 漏洞根源 software security vulnerability analysis automatic exploit exploit generation vulnerability root cause
  • 相关文献

参考文献7

二级参考文献37

  • 1陈福安,刘宗田,李力.8086 C语言反编译系统的设计及实现技术[J].小型微型计算机系统,1993,14(4):10-18. 被引量:2
  • 2付文,魏博,张天雷,赵荣彩.过程恢复技术在IA64二进制翻译中的应用与实现[J].计算机工程与应用,2006,42(21):81-83. 被引量:2
  • 3Cifuentes C, Simon D. Procedure Abstraction Recovery from Binary Code[C]//Proceedings of the Conference on Software Maintenance and Reengineering. Washington, USA: IEEE Computer Society, 2000. 被引量:1
  • 4[1]Erik R Altman,David Kaeli,Yaron Sheffer. Welcome to the Opportunities of Binary Translation[J].Computer,IEEE Computer Society Press,2000;33(3) :40~45 被引量:1
  • 5[2]Michael Gschwind et al. Dynamic and Transparent Binary Translation [J].Computer, IEEE Computer Society Press, 2000; 33 (3): 54~59 被引量:1
  • 6[3]K Ebcioglu,E Altman. DAISY:Dynamic Compilaton for 100 Percent Architectural Compatibility[C].In :Proc ISCA24,New York :ACM Press,1997: 26~37 被引量:1
  • 7[4]K Ebcioglu et al. Execution-Based Scheduling for VLIW Architectures[C].In:Proc Europar99,Lecture Notes in Computer Science 1685,Springer Verlag,Berlin, 1999:1269~1280 被引量:1
  • 8[5]Transmeta Corporation 3940 Freedom Circle.http://www.transmeta.com 被引量:1
  • 9[6]C Cifuentes,M Van Emmerik. UQBT:Adaptable Binary Translation at Low Cost[J].Computer, IEEE Computer Society Press, 2000; 33 (3):60~66 被引量:1
  • 10[7]C Cifuentes,D Simon. Procedural Abstraction Recovery from Binary Code[R].Technical Report 448,Department of Computer Science and Electrical Engineering,The University of Queensland,1999 被引量:1

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部