期刊文献+
共找到223篇文章
< 1 2 12 >
每页显示 20 50 100
桶装胀罐番茄酱中腐败菌分离纯化及鉴定研究 被引量:12
1
作者 杨红红 陈国刚 +2 位作者 刘娅 江英 王陈强 《食品工业科技》 CAS CSCD 北大核心 2014年第1期164-167,173,共5页
从胀罐番茄酱中分离出12株菌,并对这12株菌进行传统形态学、生理生化特性鉴定,得出在这12株菌株中有4株芽孢杆菌,3株酵母菌,3株链球菌,2株霉菌。经过反证实验得出导致番茄酱胀袋的主要微生物是芽孢杆菌,酵母菌和霉菌,并通过16S rDNA序... 从胀罐番茄酱中分离出12株菌,并对这12株菌进行传统形态学、生理生化特性鉴定,得出在这12株菌株中有4株芽孢杆菌,3株酵母菌,3株链球菌,2株霉菌。经过反证实验得出导致番茄酱胀袋的主要微生物是芽孢杆菌,酵母菌和霉菌,并通过16S rDNA序列分析及构建系统发育树对优势菌群芽孢杆菌鉴定为4个种,分别为:枯草芽孢杆菌,短小芽孢杆菌,凝结芽孢杆菌和蜡样芽孢杆菌。确定了导致桶装番茄酱胀袋的腐败菌。 展开更多
关键词 番茄酱 腐败 分离 16S RDNA序列分析
下载PDF
基于污点分析的嵌入式设备固件模糊测试方法 被引量:7
2
作者 戴忠华 赵波 +1 位作者 王婷 邹力 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2016年第2期125-131,共7页
针对现嵌入式设备固件的特点,提出一种基于污点分析的改进模糊测试方法。该方法首先从漏洞利用的角度分析固件的攻击面,然后根据攻击面导出相应的安全规则,并在污点分析结果中引入了测试用例危险权重,最后设计了与危险权重相对应的模糊... 针对现嵌入式设备固件的特点,提出一种基于污点分析的改进模糊测试方法。该方法首先从漏洞利用的角度分析固件的攻击面,然后根据攻击面导出相应的安全规则,并在污点分析结果中引入了测试用例危险权重,最后设计了与危险权重相对应的模糊测试用例集合。通过利用该方法对主流设备进行的漏洞挖掘实验,成功发现隐藏于设备固件中的若干零日漏洞。实验结果证明,该方法具备一定的有效性和实用性。 展开更多
关键词 嵌入式 固件 漏洞挖掘 污点 危险权重
下载PDF
SwordDTA: A Dynamic Taint Analysis Tool for Software Vulnerability Detection 被引量:4
3
作者 CAI Jun ZOU Peng +1 位作者 MA Jinxin HE Jun 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期10-20,共11页
Software vulnerabilities are the root cause of various information security incidents while dynamic taint analysis is an emerging program analysis technique. In this paper, to maximize the use of the technique to dete... Software vulnerabilities are the root cause of various information security incidents while dynamic taint analysis is an emerging program analysis technique. In this paper, to maximize the use of the technique to detect software vulnerabilities, we present SwordDTA, a tool that can perform dynamic taint analysis for binaries. This tool is flexible and extensible that it can work with commodity software and hardware. It can be used to detect software vulnerabilities with vulnerability modeling and taint check. We evaluate it with a number of commonly used real-world applications. The experimental results show that SwordDTA is capable of detecting at least four kinds of softavare vulnerabilities including buffer overflow, integer overflow, division by zero and use-after-free, and is applicable for a wide range of software. 展开更多
关键词 information security software vulnerability detection dynamic taint analysis use-after-free
原文传递
基于污点和概率的逃逸恶意软件多路径探索
4
作者 徐钫洲 张网 +1 位作者 羌卫中 金海 《Security and Safety》 2023年第3期83-106,共24页
Static analysis is often impeded by malware obfuscation techniques,such as encryption and packing,whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution information.Unfortu... Static analysis is often impeded by malware obfuscation techniques,such as encryption and packing,whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution information.Unfortunately,malware can employ evasive techniques to detect the analysis environment and alter its behavior accordingly.While known evasive techniques can be explicitly dismantled,the challenge lies in generically dismantling evasions without full knowledge of their conditions or implementations,such as logic bombs that rely on uncertain conditions,let alone unsupported evasive techniques,which contain evasions without corresponding dismantling strategies and those leveraging unknown implementations.In this paper,we present Antitoxin,a prototype for automatically exploring evasive malware.Antitoxin utilizes multi-path exploration guided by taint analysis and probability calculations to effectively dismantle evasive techniques.The probabilities of branch execution are derived from dynamic coverage,while taint analysis helps identify paths associated with evasive techniques that rely on uncertain conditions.Subsequently,Antitoxin prioritizes branches with lower execution probabilities and those influenced by taint analysis for multi-path exploration.This is achieved through forced execution,which forcefully sets the outcomes of branches on selected paths.Additionally,Antitoxin employs active anti-evasion countermeasures to dismantle known evasive techniques,thereby reducing exploration overhead.Furthermore,Antitoxin provides valuable insights into sensitive behaviors,facilitating deeper manual analysis.Our experiments on a set of highly evasive samples demonstrate that Antitoxin can effectively dismantle evasive techniques in a generic manner.The probability calculations guide the multi-path exploration of evasions without requiring prior knowledge of their conditions or implementations,enabling the dismantling of unsupported techniques such as C2 and significantly improving efficiency compared to linear ex 展开更多
关键词 Malware analysis dynamic binary instrumentation forced execution taint analysis evasion detection
原文传递
Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis 被引量:3
5
作者 Rongkuan MA Hao ZHENG +3 位作者 Jingyi WANG Mufeng WANG Qiang WEI Qingxian WANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第3期351-360,共10页
Proprietary(or semi-proprietary)protocols are widely adopted in industrial control systems(ICSs).Inferring protocol format by reverse engineering is important for many network security applications,e.g.,program tests ... Proprietary(or semi-proprietary)protocols are widely adopted in industrial control systems(ICSs).Inferring protocol format by reverse engineering is important for many network security applications,e.g.,program tests and intrusion detection.Conventional protocol reverse engineering methods have been proposed which are considered time-consuming,tedious,and error-prone.Recently,automatical protocol reverse engineering methods have been proposed which are,however,neither effective in handling binary-based ICS protocols based on network traffic analysis nor accurate in extracting protocol fields from protocol implementations.In this paper,we present a framework called the industrial control system protocol reverse engineering framework(ICSPRF)that aims to extract ICS protocol fields with high accuracy.ICSPRF is based on the key insight that an individual field in a message is typically handled in the same execution context,e.g.,basic block(BBL)group.As a result,by monitoring program execution,we can collect the tainted data information processed in every BBL group in the execution trace and cluster it to derive the protocol format.We evaluate our approach with six open-source ICS protocol implementations.The results show that ICSPRF can identify individual protocol fields with high accuracy(on average a 94.3%match ratio).ICSPRF also has a low coarse-grained and overly fine-grained match ratio.For the same metric,ICSPRF is more accurate than AutoFormat(88.5%for all evaluated protocols and 80.0%for binary-based protocols). 展开更多
关键词 Industrial control system(ICS) ICS protocol reverse engineering Dynamic taint analysis Protocol format
原文传递
A Taint Analysis Framework Applied to Android Applications in the Packed State
6
作者 Shouying Bai Lu Ma +1 位作者 Huan Ma Wei Liu 《China Communications》 SCIE CSCD 2023年第3期336-346,共11页
In recent years,Android applications have caused personal privacy leaks frequently.In order to analyze the malicious behavior,taint analysis technology can be used to track the API call chain,build a control-flow grap... In recent years,Android applications have caused personal privacy leaks frequently.In order to analyze the malicious behavior,taint analysis technology can be used to track the API call chain,build a control-flow graph of function,and determine whether there is a security risk.However,with the continuous escalation of offensive and defensive confrontation of source code,more and more applications use reinforcement technology to prevent security practitioners from performing reverse analysis,therefore it is impossible to analyze function-behavior from the source code.Thus,we design a framework of taint analysis that applied to the Android applications,which automatically unpacks the Android APKs,restores the real source code of the App,performs taint analysis,and generates a control-flow graph of function.Experimental tests showed that the system can cope with the current mainstream reinforcement technology and restore the real Dex file quickly.Simultaneously,compared with the number of nodes before packing,the generated control-flow graph had an explosive increase,which effectively assisted manual analysis of App with the privacy leakage behaviors. 展开更多
关键词 privacy disclosure unpacked technology taint analysis
下载PDF
Smart Contract Fuzzing Based on Taint Analysis and Genetic Algorithms 被引量:1
7
作者 Zaoyu Wei Jiaqi Wang +1 位作者 Xueqi Shen Qun Luo 《Journal of Quantum Computing》 2020年第1期11-24,共14页
Smart contract has greatly improved the services and capabilities of blockchain,but it has become the weakest link of blockchain security because of its code nature.Therefore,efficient vulnerability detection of smart... Smart contract has greatly improved the services and capabilities of blockchain,but it has become the weakest link of blockchain security because of its code nature.Therefore,efficient vulnerability detection of smart contract is the key to ensure the security of blockchain system.Oriented to Ethereum smart contract,the study solves the problems of redundant input and low coverage in the smart contract fuzz.In this paper,a taint analysis method based on EVM is proposed to reduce the invalid input,a dangerous operation database is designed to identify the dangerous input,and genetic algorithm is used to optimize the code coverage of the input,which construct the fuzzing framework for smart contract together.Finally,by comparing Oyente and ContractFuzzer,the performance and efficiency of the framework are proved. 展开更多
关键词 Smart contract FUZZING taint analysis genetic algorithms
下载PDF
ELAID:detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis 被引量:1
8
作者 Lili Xu Mingjie Xu +1 位作者 Feng Li Wei Huo 《Cybersecurity》 CSCD 2020年第1期248-266,共19页
The Integer-Overflow-to-Buffer-Overflow(IO2BO)vulnerability has been widely exploited by attackers to cause severe damages to computer systems.Automatically identifying this kind of vulnerability is critical for softw... The Integer-Overflow-to-Buffer-Overflow(IO2BO)vulnerability has been widely exploited by attackers to cause severe damages to computer systems.Automatically identifying this kind of vulnerability is critical for software security.Despite many works have been done to mitigate integer overflow,existing tools either report large number of false positives or introduce unacceptable time consumption.To address this problem,in this article we present a static analysis framework.It first constructs an inter-procedural call graph and utilizes taint analysis to accurately identify potential IO2BO vulnerabilities.Then it uses a light-weight method to further filter out false positives.Specifically,it generates constraints representing the conditions under which a potential IO2BO vulnerability can be triggered,and feeds the constraints to SMT solver to decide their satisfiability.We have implemented a prototype system ELAID based on LLVM,and evaluated it on 228 programs of the NIST’s SAMATE Juliet test suite and 14 known IO2BO vulnerabilities in real world.The experiment results show that our system can effectively and efficiently detect all known IO2BO vulnerabilities. 展开更多
关键词 Integer-Overflow-to-Buffer-Overflow(IO2BO)vulnerability Inter-procedural dataflow analysis taint analysis Path satisfiability
原文传递
ovAFLow:Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference
9
作者 Gen Zhang Peng-Fei Wang +3 位作者 Tai Yue Xiang-Dong Kong Xu Zhou Kai Lu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2022年第2期405-422,共18页
Grey-box fuzzing is an effective technology to detect software vulnerabilities,such as memory corruption.Previous fuzzers in detecting memory corruption bugs either use heavy-weight analysis,or use techniques which ar... Grey-box fuzzing is an effective technology to detect software vulnerabilities,such as memory corruption.Previous fuzzers in detecting memory corruption bugs either use heavy-weight analysis,or use techniques which are not customized for memory corruption detection.In this paper,we propose a novel memory bug guided fuzzer,ovAFLow.To begin with,we broaden the memory corruption targets where we frequently identify bugs.Next,ovAFLow utilizes light-weight and effective methods to build connections between the fuzzing inputs and these corruption targets.Based on the connection results,ovAFLow uses customized techniques to direct the fuzzing process closer to memory corruption.We evaluate ovAFLow against state-of-the-art fuzzers,including AFL(american fuzzy lop),AFLFast,FairPuzz,QSYM,Angora,TIFF,and TortoiseFuzz.The evaluation results show better vulnerability detection ability of ovAFLow,and the performance overhead is acceptable.Moreover,we identify 12 new memory corruption bugs and two CVEs(common vulnerability exposures)with the help of ovAFLow. 展开更多
关键词 FUZZING memory corruption taint inference
原文传递
Smart Contract Fuzzing Based on Taint Analysis and Genetic Algorithms
10
作者 Zaoyu Wei Jiaqi Wang +1 位作者 Xueqi Shen Qun Luo 《Journal of Information Hiding and Privacy Protection》 2020年第1期35-45,共11页
Smart contract has greatly improved the services and capabilities of blockchain,but it has become the weakest link of blockchain security because of its code nature.Therefore,efficient vulnerability detection of smart... Smart contract has greatly improved the services and capabilities of blockchain,but it has become the weakest link of blockchain security because of its code nature.Therefore,efficient vulnerability detection of smart contract is the key to ensure the security of blockchain system.Oriented to Ethereum smart contract,the study solves the problems of redundant input and low coverage in the smart contract fuzz.In this paper,a taint analysis method based on EVM is proposed to reduce the invalid input,a dangerous operation database is designed to identify the dangerous input,and genetic algorithm is used to optimize the code coverage of the input,which construct the fuzzing framework for smart contract together.Finally,by comparing Oyente and ContractFuzzer,the performance and efficiency of the framework are proved. 展开更多
关键词 Smart contract FUZZING taint analysis genetic algorithms
下载PDF
From proof-of-concept to exploitable
11
作者 Yan Wang WeiWu +3 位作者 Chao Zhang Xinyu Xing Xiaorui Gong Wei Zou 《Cybersecurity》 CSCD 2019年第1期189-213,共25页
Exploitability assessment of vulnerabilities is important for both defenders and attackers.The ultimate way to assess the exploitability is crafting a working exploit.However,it usually takes tremendous hours and sign... Exploitability assessment of vulnerabilities is important for both defenders and attackers.The ultimate way to assess the exploitability is crafting a working exploit.However,it usually takes tremendous hours and significant manual efforts.To address this issue,automated techniques can be adopted.Existing solutions usually explore in depth the crashing paths,i.e.,paths taken by proof-of-concept(PoC)inputs triggering vulnerabilities,and assess exploitability by finding exploitable states along the paths.However,exploitable states do not always exist in crashing paths.Moreover,existing solutions heavily rely on symbolic execution and are not scalable in path exploration and exploit generation.In this paper,we propose a novel solution to generate exploit for userspace programs or facilitate the process of crafting a kernel UAF exploit.Technically,we utilize oriented fuzzing to explore diverging paths from vulnerability point.For userspace programs,we adopt a control-flow stitching solution to stitch crashing paths and diverging paths together to generate exploit.For kernel UAF,we leverage a lightweight symbolic execution to identify,analyze and evaluate the system calls valuable and useful for exploiting vulnerabilities.We have developed a prototype system and evaluated it on a set of 19 CTF(capture the flag)programs and 15 realworld Linux kernel UAF vulnerabilities.Experiment results showed it could generate exploit for most of the userspace test set,and it could also facilitate security mitigation bypassing and exploitability evaluation for kernel test set. 展开更多
关键词 EXPLOIT VULNERABILITY taint analysis FUZZING Symbolic execution
原文传递
ELAID:detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
12
作者 Lili Xu Mingjie Xu +1 位作者 Feng Li Wei Huo 《Cybersecurity》 2018年第1期860-878,共19页
The Integer-Overflow-to-Buffer-Overflow(IO2BO)vulnerability has been widely exploited by attackers to cause severe damages to computer systems.Automatically identifying this kind of vulnerability is critical for softw... The Integer-Overflow-to-Buffer-Overflow(IO2BO)vulnerability has been widely exploited by attackers to cause severe damages to computer systems.Automatically identifying this kind of vulnerability is critical for software security.Despite many works have been done to mitigate integer overflow,existing tools either report large number of false positives or introduce unacceptable time consumption.To address this problem,in this article we present a static analysis framework.It first constructs an inter-procedural call graph and utilizes taint analysis to accurately identify potential IO2BO vulnerabilities.Then it uses a light-weight method to further filter out false positives.Specifically,it generates constraints representing the conditions under which a potential IO2BO vulnerability can be triggered,and feeds the constraints to SMT solver to decide their satisfiability.We have implemented a prototype system ELAID based on LLVM,and evaluated it on 228 programs of the NIST’s SAMATE Juliet test suite and 14 known IO2BO vulnerabilities in real world.The experiment results show that our system can effectively and efficiently detect all known IO2BO vulnerabilities. 展开更多
关键词 Integer-Overflow-to-Buffer-Overflow(IO2BO)vulnerability Inter-procedural dataflow analysis taint analysis Path satisfiability
原文传递
基于ARM架构的信息流追踪系统的设计与实现
13
作者 施祖清 张涛 +2 位作者 王金双 姚金魁 袁志坚 《计算机技术与发展》 2012年第6期147-150,共4页
当前,智能手机平台面临着众多的安全威胁。动态信息流追踪是一种能够检测缓冲区溢出等安全威胁的有效技术。文中分析了动态信息流追踪技术的基本原理,设计并实现了基于ARM架构的信息流追踪系统。该系统通过在页表项上扩展添加污点标记... 当前,智能手机平台面临着众多的安全威胁。动态信息流追踪是一种能够检测缓冲区溢出等安全威胁的有效技术。文中分析了动态信息流追踪技术的基本原理,设计并实现了基于ARM架构的信息流追踪系统。该系统通过在页表项上扩展添加污点标记位来标识来自不可信数据源的数据,扩充ARM架构指令集,在指令层追踪数据的传播过程并相应地完成污点传播。当系统跳转到来自不可信数据源的内存段执行时,CPU将产生异常通知用户,根据系统安全策略决定是否允许该操作继续执行。研究表明该系统能够有效实现ARM架构智能平台的安全防护。 展开更多
关键词 信息流追踪 ARM架构 页表项 指令层 污点
下载PDF
From proof-of-concept to exploitable
14
作者 Yan Wang WeiWu +3 位作者 Chao Zhang Xinyu Xing Xiaorui Gong Wei Zou 《Cybersecurity》 2018年第1期464-488,共25页
Exploitability assessment of vulnerabilities is important for both defenders and attackers.The ultimate way to assess the exploitability is crafting a working exploit.However,it usually takes tremendous hours and sign... Exploitability assessment of vulnerabilities is important for both defenders and attackers.The ultimate way to assess the exploitability is crafting a working exploit.However,it usually takes tremendous hours and significant manual efforts.To address this issue,automated techniques can be adopted.Existing solutions usually explore in depth the crashing paths,i.e.,paths taken by proof-of-concept(PoC)inputs triggering vulnerabilities,and assess exploitability by finding exploitable states along the paths.However,exploitable states do not always exist in crashing paths.Moreover,existing solutions heavily rely on symbolic execution and are not scalable in path exploration and exploit generation.In this paper,we propose a novel solution to generate exploit for userspace programs or facilitate the process of crafting a kernel UAF exploit.Technically,we utilize oriented fuzzing to explore diverging paths from vulnerability point.For userspace programs,we adopt a control-flow stitching solution to stitch crashing paths and diverging paths together to generate exploit.For kernel UAF,we leverage a lightweight symbolic execution to identify,analyze and evaluate the system calls valuable and useful for exploiting vulnerabilities.We have developed a prototype system and evaluated it on a set of 19 CTF(capture the flag)programs and 15 realworld Linux kernel UAF vulnerabilities.Experiment results showed it could generate exploit for most of the userspace test set,and it could also facilitate security mitigation bypassing and exploitability evaluation for kernel test set. 展开更多
关键词 EXPLOIT VULNERABILITY taint analysis FUZZING Symbolic execution
原文传递
污点分析技术的原理和实践应用 被引量:48
15
作者 王蕾 李丰 +1 位作者 李炼 冯晓兵 《软件学报》 EI CSCD 北大核心 2017年第4期860-882,共23页
信息流分析可以有效保证计算机系统中信息的保密性和完整性,污点分析作为其实践,被广泛用于软件系统的安全保障技术领域.对近些年来面向解决应用程序安全问题的污点分析技术进行综述:首先,总结了污点分析的基本原理以及在应用中的通用技... 信息流分析可以有效保证计算机系统中信息的保密性和完整性,污点分析作为其实践,被广泛用于软件系统的安全保障技术领域.对近些年来面向解决应用程序安全问题的污点分析技术进行综述:首先,总结了污点分析的基本原理以及在应用中的通用技术,即,使用动态和静态的方法解决污点传播;随后,分析该技术在移动终端、互联网平台上的应用过程中遇到的问题和解决方案,包括解决Android应用隐私泄露与检测Web系统安全漏洞的污点分析技术;最后,展望该技术的研究前景和发展趋势. 展开更多
关键词 污点分析 信息流分析 软件安全 静态分析与动态分析 ANDROID WEB
下载PDF
一个面向Android的隐私泄露检测系统 被引量:25
16
作者 杨广亮 龚晓锐 +1 位作者 姚刚 韩心慧 《计算机工程》 CAS CSCD 2012年第23期1-6,共6页
针对Android软件中存在的用户隐私信息泄露问题,基于动态污点跟踪技术实现TaintChaser自动化检测系统。该系统能对软件中存在的用户隐私信息泄露行为进行细粒度的跟踪,实现对手机软件规模化自动化的检测与分析。利用该系统对28 369个And... 针对Android软件中存在的用户隐私信息泄露问题,基于动态污点跟踪技术实现TaintChaser自动化检测系统。该系统能对软件中存在的用户隐私信息泄露行为进行细粒度的跟踪,实现对手机软件规模化自动化的检测与分析。利用该系统对28 369个Android程序进行检测,结果表明,有24.69%的程序可能存在泄露用户隐私信息的行为。 展开更多
关键词 动态污点跟踪 ANDROID系统 隐私泄露 自动化测试 恶意软件
下载PDF
基于敏感字符的SQL注入攻击防御方法 被引量:20
17
作者 张慧琳 丁羽 +5 位作者 张利华 段镭 张超 韦韬 李冠成 韩心慧 《计算机研究与发展》 EI CSCD 北大核心 2016年第10期2262-2276,共15页
SQL注入攻击历史悠久,其检测机制也研究甚广.现有的研究利用污点分析(taint analysis)结合SQL语句语法分析进行SQL注入攻击检测,但由于需要修改Web应用程序执行引擎来标记和跟踪污点信息,难以部署,并且时间和空间性能损失过大.通过分析... SQL注入攻击历史悠久,其检测机制也研究甚广.现有的研究利用污点分析(taint analysis)结合SQL语句语法分析进行SQL注入攻击检测,但由于需要修改Web应用程序执行引擎来标记和跟踪污点信息,难以部署,并且时间和空间性能损失过大.通过分析SQL注入攻击机理,提出一种基于敏感字符的SQL注入攻击防御方法.1)仅对来自常量字符串的可信敏感字符进行积极污点标记;2)无需修改Web应用程序执行引擎,利用编码转换将污点信息直接存储在可信敏感字符的编码值中,动态跟踪其在程序中的传播;3)无需SQL语句语法分析,只需利用编码值判断SQL语句中敏感字符的来源、转义非可信敏感字符,即可防御SQL注入攻击.基于PHP的Zend引擎实现了系统原型PHPGate,以插件方式实现、易部署.实验证明:PHPGate可精确防御SQL注入攻击,且有效提升污点传播效率,页面应答的时间开销不超过1.6%. 展开更多
关键词 SQL注入攻击 可信敏感字符 动态污点分析 积极污点分析 编码转换
下载PDF
基于行为依赖特征的恶意代码相似性比较方法 被引量:21
18
作者 杨轶 苏璞睿 +1 位作者 应凌云 冯登国 《软件学报》 EI CSCD 北大核心 2011年第10期2438-2453,共16页
恶意代码相似性比较是恶意代码分析和检测的基础性工作之一,现有方法主要是基于代码结构或行为序列进行比较.但恶意代码编写者常采用代码混淆、程序加壳等手段对恶意代码进行处理,导致传统的相似性比较方法失效.提出了一种基于行为之间... 恶意代码相似性比较是恶意代码分析和检测的基础性工作之一,现有方法主要是基于代码结构或行为序列进行比较.但恶意代码编写者常采用代码混淆、程序加壳等手段对恶意代码进行处理,导致传统的相似性比较方法失效.提出了一种基于行为之间控制依赖关系和数据依赖关系的恶意代码相似性比较方法,该方法利用动态污点传播分析识别恶意行为之间的依赖关系,然后,以此为基础构造控制依赖图和数据依赖图,根据两种依赖关系进行恶意代码的相似性比较.该方法充分利用了恶意代码行为之间内在的关联性,提高了比较的准确性,具有较强的抗干扰能力;通过循环消除、垃圾行为删除等方法对依赖图进行预处理,降低了相似性比较算法的复杂度,加快了比较速度.实验结果表明,与现有方法相比,该方法的准确性和抗干扰能力均呈现明显优势. 展开更多
关键词 恶意代码 相似性比较 动态分析 污点传播
下载PDF
信息流控制研究进展 被引量:22
19
作者 吴泽智 陈性元 +1 位作者 杨智 杜学绘 《软件学报》 EI CSCD 北大核心 2017年第1期135-159,共25页
信息流控制能够保证数据与隐私端到端安全,一直是信息安全领域研究的重点和难点.为介绍信息流控制相关的研究现状和进展,首先,从基于格、安全类型系统、安全进程代数和自动机这4个方面介绍了信息流控制的基本理论与模型;其次,从计算机... 信息流控制能够保证数据与隐私端到端安全,一直是信息安全领域研究的重点和难点.为介绍信息流控制相关的研究现状和进展,首先,从基于格、安全类型系统、安全进程代数和自动机这4个方面介绍了信息流控制的基本理论与模型;其次,从计算机层次结构由下而上出发,综述了基于硬件、操作系统、虚拟机、高级语言、低级语言、数据库和网络的信息流控制实现方法,并对比了各类研究的特点;然后,结合当今时代前沿技术,分析了信息流控制在云计算、移动互联、大数据和物联网等新技术下的应用;最后,总结了当前信息流控制相关研究中存在的问题,并针对今后该领域的研究趋势进行了展望,对下一步研究工作有一定的参考价值. 展开更多
关键词 信息流控制 安全模型 安全类型系统 进程代数 动态污点跟踪
下载PDF
基于信息流策略的污点传播分析及动态验证 被引量:21
20
作者 黄强 曾庆凯 《软件学报》 EI CSCD 北大核心 2011年第9期2036-2048,共13页
基于流和上下文敏感的SSA(static single assignment)信息流分析技术,提出了一种细粒度、可扩展的污点传播检测方法.利用控制流和数据流的相关信息,跟踪污染数据及其传播路径,可以检测缓冲区溢出、格式化串漏洞等程序脆弱性.分析过程在... 基于流和上下文敏感的SSA(static single assignment)信息流分析技术,提出了一种细粒度、可扩展的污点传播检测方法.利用控制流和数据流的相关信息,跟踪污染数据及其传播路径,可以检测缓冲区溢出、格式化串漏洞等程序脆弱性.分析过程在潜在问题点自动插装动态验证函数,在无需用户干预的情况下保证了程序的运行时安全.在GCC编译器的基础上实现了分析系统,实验结果表明,该方法具有较高的精确度和时空效率. 展开更多
关键词 脆弱性 信息流 污点传播 动态验证 静态单一赋值
下载PDF
上一页 1 2 12 下一页 到第
使用帮助 返回顶部