|本期目录/Table of Contents|

[1]代 伟,刘 洪.一种基于控制流的污点分析方法[J].绵阳师范学院学报,2018,(08):96-100.[doi:10.16276/j.cnki.cn51-1670/g.2018.08.018]
 DAI Wei,LIU Hong.On a Control-flow based Taint Analysis[J].Journal of Mianyang Normal University,2018,(08):96-100.[doi:10.16276/j.cnki.cn51-1670/g.2018.08.018]
点击复制

一种基于控制流的污点分析方法(PDF)
分享到:

《绵阳师范学院学报》[ISSN:1672-612X/CN:51-1670/G]

卷:
期数:
2018年08期
页码:
96-100
栏目:
计算机与网络技术
出版日期:
2018-08-07

文章信息/Info

Title:
On a Control-flow based Taint Analysis
文章编号:
1672-612X(2018)08-0096-05
作者:
代 伟1 刘 洪2
1.内江师范学院计算机科学学院,四川内江 641112; 2.四川大学计算机学院,四川成都 610065
Author(s):
DAI Wei1 LIU Hong2
1.College of Computer Science,Neijiang normal university,Neijiang, Sichuan 641112; 2.Department of College of Computer Science,Sichuan University,Chengdu, Sichuan 610064
关键词:
污点分析 静态分析 控制流图 分支
Keywords:
taint analysis static analysis CFG branch
分类号:
TP311
DOI:
10.16276/j.cnki.cn51-1670/g.2018.08.018
文献标志码:
A
摘要:
污点分析是网络安全中的重要领域,将静态分析应用于动态污点分析,提出一种基于控制流图(CFG)的控制流污点传播方法.污点分析在遇到分支时,结合静态信息(如CFG和支配结点)将谓词的污点标记传播到分支块; 并提出优化算法加强效率.本文实现了基于二进制代码的原形系统,并对真实程序进行了测试,实验结果表明该方法能有效传播谓词的污点到分支路径.
Abstract:
Taint analysis is an important field in security of network. We proposed CFG-based information flow taint propagation which incorporates static analysis. When dynamic taint analysis encounters branches, it propagates taint of predicate to branch blocks using CFG and dominance information. We also proposed an optimization to improve efficiency. A prototype system was implemented to analyze binary code and evaluate real-world applications. Experiment results showed our approach can effectively propagate taint of predicate to branch blocks.

参考文献/References:

[1] David Moore,Colleen Shannon,et al.Code-Red:a case study on the spread and victims of an internet worm[C].Proceedings of 2nd ACM SIGCOMM Workshop on Internet Measurement,2002:273-284.
[2] Niall Fitzgibbon and Mike Wood.Conficker:A Technical Analysis.SophosLabs,Sophon Inc.
[3] NewsomeJ.,Song.D.Dynamic Taint Analysis for Automatic Detection,Analysis,and Signature Generation of Exploits on Commodity Software[C].Proceedings of NDSS,2005.
[4] Wei Xu,Sandeep Bhatkar and R.Sekar.Taint-Enhanced Policy Enforcement:A Practical Approach to Defeat a Wide Range of Attacks[C].USENIX Security Symposium,2006.
[5] 孔德光,郑烇,帅建梅.基于污点分析的源代码脆弱性检测技术[J].小型微型计算机系统,2009,30(1):78-82.
[6] Dorothy E.Denning.A lattice model for secure information flow[J].Communications of the ACM,Vol.19,Issue 5,1976.
[7] Cavallaro L.,Saxena P.,Sekar,R.On the limits of information flow techniques for malware analysis and containment[C].Detection of Intrusions and Malware and Vulnerability Assessment,July 2008.
[8] Bao T.,Zheng Y.,Lin Z.,et al.Strict control dependence and its effect on dynamic information flow analyses[C].International Symposium on Software Testing and Analysis(ISSTA),2010:13-24,Trento,Italy,July.
[9] 曾鸣,赵荣彩,姚京松.基于特征提取的二进制代码比较技术[J].计算机工程与应用,2006,42(22):8-11.
[10] Heng Yin,Dawn Song,et al.Panorama:Capturing System-wide Information Flow for Malware Detection and Analysis[C].ACM Conference on Computer and Communication Security(CCS),2007.

相似文献/References:

备注/Memo

备注/Memo:
收稿日期:2018-03-24
基金项目:国家自然科学基金(71573184).
作者简介:代伟(1978- ),男,四川内江人,副教授,硕士,主要研究方向:网络安全;
刘洪(1978- ),男,四川成都人,副教授,博士,主要研究方向:网络应用与安全.
更新日期/Last Update: 2018-08-07