首页> 外文会议>2014 IEEE Workshop on Electronics, Computer and Applications >Directed symbolic execution for binary vulnerability mining
【24h】

Directed symbolic execution for binary vulnerability mining

机译:定向符号执行用于二进制漏洞挖掘

获取原文
获取原文并翻译 | 示例

摘要

Despite more than two decades of independent, academic, and industry-related research, software vulnerabilities remain the main reason that undermine the security of our systems. Taint analysis and symbolic execution are among the most promising approaches for vulnerability detection, but either one can't remit the problem separately. In this paper, we try to combine taint analysis and symbolic execution for binary vulnerability mining and proposed a method named directed symbolic execution. Our three-step approach firstly adopts dynamic taint analysis technology to identify the safety-related data, and then uses symbolic execution system to execute the binary software while marks those safety-related data as symbols, and finally discovers vulnerabilities with our check-model. The evaluation shows that our method can be used to detect vulnerabilities in binary software more efficiently.
机译:尽管进行了超过二十年的独立,学术和行业相关研究,但软件漏洞仍然是破坏我们系统安全性的主要原因。污点分析和符号执行是漏洞检测中最有前途的方法之一,但是任何一种都不能单独解决该问题。在本文中,我们尝试将污点分析与符号执行相结合以进行二进制漏洞挖掘,并提出了一种称为定向符号执行的方法。我们的三步方法首先采用动态污染分析技术来识别安全相关数据,然后使用符号执行系统执行二进制软件,同时将这些安全相关数据标记为符号,最后使用我们的检查模型发现漏洞。评估表明,我们的方法可用于更有效地检测二进制软件中的漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号