检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]解放军理工大学指挥信息系统学院,江苏南京210007
出 处:《计算机技术与发展》2015年第8期156-160,共5页Computer Technology and Development
基 金:国家科技重大专项基金资助项目(2012ZX03006-003)
摘 要:传统的漏洞挖掘技术一般适用于x86平台,且是面向PC的。随着Android手机的普及,需要有针对其上运行软件的漏洞挖掘技术。针对当前Android软件市场审核宽松以及该领域研究相对较少等方面存在的一些问题,设计并实现了一种基于gdb的Android软件漏洞挖掘系统。系统采用基于信息流追踪的污点分析技术,从污点标记、污点传播和污点检测三个方面进行设计,并通过指令模拟执行提高分析覆盖率。当系统发现可疑漏洞时,把结果通知给用户,并能对漏洞做出全面的分析。通过对Android软件的测试,发现了部分软件中的缓冲区溢出漏洞,证实了系统的有效性。The traditional vulnerability mining techniques are generally applicable to x86 platform, and intent to the PC. With the popularity of Android phones, the vulnerability mining technology running on it is needed. Because of the problems of the current accommodative Android software market audit and relatively small research in this area, a gdb-based Android software vulnerabilities mining system is designed and implemented. The system adopts taint analysis techniques based on tracking the flow of information, which is designed from taint marking, taint transmission and taint detection, and improves analysis coverage through instruction simulation. The result is notified to the user and the system can make a comprehensive analysis of vulnerability when the system finds the suspicious loopholes. By the test for Android software, some buffer overflow vulnerabilities in software is found, which proves the effectiveness of the system.
分 类 号:TP302.1[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.117

