首页 | 官方网站   微博 | 高级检索  
     

基于结构特征的二进制代码安全缺陷分析模型
引用本文:许团,屈蕾蕾,石文昌. 基于结构特征的二进制代码安全缺陷分析模型[J]. 网络与信息安全学报, 2017, 3(9): 31-39. DOI: 10.11959/j.issn.2096-109x.2017.00200
作者姓名:许团  屈蕾蕾  石文昌
作者单位:中国人民大学信息学院,北京 100872
基金项目:国家自然科学基金资助项目(61472429);北京市自然科学基金资助项目(4122041)
摘    要:针对现有方法检测复杂结构二进制代码安全缺陷的不足,提出新的分析模型,并给出其应用方法。首先以缺陷的源代码元素集合生成特征元素集合,抽取代码结构信息,构建分析模型。然后依据各类中间表示(IR,intermediate representation)语句的统计概率计算分析模型,查找满足特征模型的IR代码组,通过IR代码与二进制代码的转换关系,实现对二进制程序中代码安全缺陷的有效检测。分析模型可应用于二进制单线程程序和并行程序。实验结果表明,相对于现有方法,应用该分析模型能够更全面深入地检测出各类结构复杂的二进制代码安全缺陷,且准确率更高。

关 键 词:二进制分析  分析模型  软件安全缺陷检测  缺陷代码识别  

Analysis model of binary code security flaws based on structure characteristics
Tuan XU,Lei-lei QU,Wen-chang SHI. Analysis model of binary code security flaws based on structure characteristics[J]. Chinese Journal of Network and Information Security, 2017, 3(9): 31-39. DOI: 10.11959/j.issn.2096-109x.2017.00200
Authors:Tuan XU  Lei-lei QU  Wen-chang SHI
Affiliation:School of Information,Renmin University of China,Beijing 100872,China
Abstract:Aiming at the shortcomings of the existing methods to detect the security flaws that have complex structures,a new analysis model and its application method was proposed.First,analysis models based on key information of code structures extracted from path subsets of characteristic element sets that are generated by source code element sets of code security flaws were constructed.Then the analysis model according to the statistical probability of each kind of IR statement was calculated,and the IR code group which matched the feature model was found.Finally,through the translating relation between binary codes and IR codes,various code security flaws of binary program were found out.The analysis models can be applied to both common single-process binary programs and binary parallel programs.Experimental results show that compared with the existing methods,the application of the analysis model can be more comprehensive and in-depth in detecting various types of complex binary code security flaws with higher accuracy.
Keywords:binary analysis  analysis model  software security detection  flaw code recognition  
点击此处可从《网络与信息安全学报》浏览原始摘要信息
点击此处可从《网络与信息安全学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号