作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2010, Vol. 36 ›› Issue (7): 139-141. doi: 10.3969/j.issn.1000-3428.2010.07.047

• 安全技术 • 上一篇    下一篇

基于动态染色的内存漏洞定位技术

房 陈,茅 兵,谢 立   

  1. (南京大学计算机科学与技术系软件新技术国家重点实验室,南京 210093)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2010-04-05 发布日期:2010-04-05

Memory-related Vulnerabilities Localization Technology Based on Dynamic Tainting

FANG Chen, MAO Bing, XIE Li   

  1. (State Key Laboratory of Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing 210093)
  • Received:1900-01-01 Revised:1900-01-01 Online:2010-04-05 Published:2010-04-05

摘要: 针对程序漏洞,提出利用基于二进制的程序染色和程序分析技术来检测恶意攻击并有效定位程序漏洞,采用数据依赖关系分析和动态染色的方法,记录起传播作用的写指令及目的内存地址,当检测到漏洞攻击时,通过内存地址找到恶意写指令并定位漏洞。实验结果证明,该方法能成功定位常见内存漏洞的位置,并能定位到有漏洞的库函数的调用点。

关键词: 程序漏洞, 攻击检测, 程序染色, 缓冲区溢出, 格式化字符串

Abstract: This paper proposes an efficient mechanism to detect and locate the program vulnerability based on the binary taint analysis and program analysis techniques. The method adopts the data flow analysis and taint analysis. The taint analysis method records the instruction which propagates the taint flag as well as the memory address it writes to. When it detects the attack, it locates the bug by searching the malicious write instruction through the memory address it records. Results of experiments show that the system can localize popular vulnerabilities successfully, and it is able to localize library function call point.

Key words: program vulnerability, attack detection, program tainting, buffer overflow, format string

中图分类号: