首页> 外文期刊>Soft computing: A fusion of foundations, methodologies and applications >A taint based approach for automatic reverse engineering of gray-box file formats
【24h】

A taint based approach for automatic reverse engineering of gray-box file formats

机译:基于污点的灰盒文件格式自动反向工程方法

获取原文
获取原文并翻译 | 示例
           

摘要

File format vulnerabilities have been highlighted in recent years, and the performance of fuzzing tests relies heavily on the knowledge of target formats. In this paper, we present systematic algorithms and methods to automatically reverse engineer input file formats. The methodology employs dynamic taint analysis to reveal implicit relational information between input file and binary procedures, which is used for the measurement of correlations among data bytes, format segmentation and data type inference. We have implemented a prototype, and its general tests on 10 well-published binary formats yielded an average of over 85 % successful identification rate, while more detailed structural information was unveiled beyond coarse granular format analysis. Besides, a practical pseudo-fuzzing evaluation method is discussed in accordance with real-world demands on security analysis, and the evaluation results demonstrated the practical effectiveness of our system.
机译:近年来,文件格式漏洞已被突出,模糊测试的性能在很大程度上取决于目标格式的知识。在本文中,我们提出了自动逆向工程输入文件格式的系统算法和方法。该方法采用动态污点分析来揭示输入文件和二进制过程之间的隐式关系信息,该信息用于测量数据字节之间的相关性,格式分段和数据类型推断。我们已经实现了一个原型,它对10种发布良好的二进制格式的一般测试平均成功识别率超过85%,而更详细的结构信息则不仅仅局限于粗粒度格式分析。此外,根据现实世界中对安全性分析的要求,讨论了一种实用的伪模糊评估方法,评估结果证明了该系统的实用性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号