首页 | 官方网站   微博 | 高级检索  
     

基于虚拟化技术的动态污点分析
引用本文:陈衍铃,赵静.基于虚拟化技术的动态污点分析[J].计算机应用,2011,31(9):2367-2372.
作者姓名:陈衍铃  赵静
作者单位:1. 电子工程学院 网络系,合肥 2300372. 北京理工大学 计算机学院,北京 100083
摘    要:在现有的污点分析技术基础上,针对当前污点分析工具的记录不准确等缺陷,研究并实现了基于虚拟化技术的动态污点分析。结合虚拟化技术设计了动态污点分析框架,针对内存污点数据和硬盘污点数据分别设计了基于Hook技术的污点标记模型和Hash遍历的污点标记模型,依据Intel&AMD的指令编码格式对指令进行分类并依据指令类型设计污点传播策略,为解决信息记录冗余问题设计了基于指令筛选的污点记录策略。实验证明,该技术是有效的动态污点分析方法,可以很好地运用于模糊测试中的测试用例生成与漏洞检测。

关 键 词:模糊测试  虚拟化  污点分析  漏洞挖掘  信息安全  
收稿时间:2011-01-25
修稿时间:2011-03-22

Dynamic taint analysis based on virtual technology
CHEN Yan-ling,ZHAO Jing.Dynamic taint analysis based on virtual technology[J].journal of Computer Applications,2011,31(9):2367-2372.
Authors:CHEN Yan-ling  ZHAO Jing
Affiliation:1. Department of Network, Electrical Engineering Institute, Hefei Anhui 230037, China2. School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100083, China
Abstract:The record of the current taint analysis tool is not accurate. To solve this, dynamic taint analysis based on the virtual technology was studied and implemented. A virtualization based dynamic taint analysis framework was designed, and two kinds of taint signature models based on Hook technology and Hash-traversal technology were given respectively for memory taint and hard disk taint. A taint propagation strategy was put forward according to the instruction type which was classified by instruction encoding format of Inter&AMD, and a taint record strategy based on instruction filtering was given to solve the problem of redundant information records. The experimental results prove that the proposed method is effective, and can be well used in test case generation and vulnerability detection of fuzzy test.
Keywords:fuzzy test                                                                                                                          virtualization                                                                                                                          taint analysis                                                                                                                          vulnerability discovery                                                                                                                          information security
本文献已被 CNKI 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号