期刊文献+

基于软件体系结构分析的漏洞挖掘技术研究 被引量:2

Research on vulnerability mining technology based on software architecture analysis
下载PDF
导出
摘要 为了提高漏洞挖掘效率,在软件体系结构的基础上,结合符号执行、污点分析和模糊测试中的优点,设计并实现了基于软件体系结构分析的漏洞挖掘系统Fast Fuzzing。该系统主要由体系结构分析、指令追踪、符号执行、污点分析和动态测试五个模块组成,为提高系统效率,系统针对传统技术方法进行了优化处理。实验结果表明Fast Fuzzing系统能够有效发现IE8和IE10中的安全问题,成功触发了IE8和IE10中的多个漏洞,适用于常用软件的安全测试。 To improve the efficiency of vulnerability mining,the vulnerability mining system Fast Fuzzing based on software architecture analysis was designed and implemented in combination with the advantages of symbolic execution,stain analysis and fuzzing test. This system is composed of architecture analysis,instruction tracing,symbolic execution,stain analysis and dynamic testing. To improve the system efficiency,the traditional technology method was optimized. The experimental results show that the Fast Fuzzing system can effectively detect the security problems in IE8 and IE10,successfully trigger multiple vulnerabilities in IE8 and IE10,which is suitable for the safety testing of common software.
作者 唐萍 张国强
出处 《现代电子技术》 北大核心 2016年第9期99-102,共4页 Modern Electronics Technique
关键词 模糊测试 体系结构分析 漏洞挖掘 安全漏洞 fuzzing test architecture analysis vulnerability mining security vulnerability
  • 相关文献

参考文献7

  • 1杨世德,梁光明,余凯.基于ARM嵌入式系统底层漏洞挖掘技术研究[J].现代电子技术,2015,38(18):57-59. 被引量:7
  • 2蒲石,陈周国,祝世雄.震网病毒分析与防范[J].信息网络安全,2012(2):40-43. 被引量:44
  • 3陈宝国.美国国家网络安全战略解析[J].信息网络安全,2010(1):66-68. 被引量:8
  • 4BRUMLEY D,POOSANKAM P,SONG D,et al.Automatic patch-based exploit generation is possible:techniques and implications[C]//Proceedings of 2008 IEEE Symposium on Security and Privacy.[S.l.]:IEEE,2008:143-157.
  • 5BALAKRISHNAN G,REPS T,MELSKI D,et al.What you see is not what you execute[J].ACM transactions on programming languages and systems,2010,32(6):202-213.
  • 6WANG T L,WEI T,GU G F,et al.Taint Scope:a checksumaware directed fuzzing tool for automatic software vulnerability detection[C]//Proceedings of 2010 IEEE Symposium on Security and Privacy.Oakland:IEEE,2010:497-512.
  • 7SONG D,BRUMLEY D,YIN H,et al.Bit Blaze:a new approach to computer security via binary analysis[C]//Proceedings of 2008 4th International Conference on Information Systems Security.Hyderabad:Springer,2008:1-25.

二级参考文献15

  • 1李淑文.嵌入式Linux内核模块加载技术的分析[J].广东经济管理学院学报,2004,19(4):78-80. 被引量:1
  • 2木头.美国信息安全保障体系的发展[J].信息网络安全,2005(3):68-72. 被引量:3
  • 3David Helan. Stuxnet: analysis,myths and realities [J].Actusecu 27,2010:14-23.
  • 4Amr Thabet.Stuxnet_Malware_Analysis_Paper[J].Freelancer Malware Researcher, 2010: 3-28.
  • 5Nicolas Falliere, Liam O Murchu, Eric Chien.W32.Stuxnet Dossier[R]. Symantec company, 2011.16-38.
  • 6Matrosov, Rodionov.StuxnetZUnder the Microscope 1.3[R]. ESET Company, 2010.24-65,.
  • 7Mark Russinovich. Analyzing a Stuxnet Infection with the Sysintemals Tool[EB/OL]. http://blogs.technet.com/b/markrussinovich/archive/2011 /03/30/3416253.aspx, 2010.
  • 8安天实验室对Stuxnet蠕虫攻击工业控制系统事件的综合报告[R].安全实验室,2010.4-11.
  • 9蔡红辉.嵌入式系统的安全与实现[J].科教文汇,2007(09Z):217-217. 被引量:2
  • 10YAMAURA T.How to design practical test cases[J].Software,IEEE,1998,15(6):30-36.

共引文献56

同被引文献19

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部