检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:沈维军 汤恩义[1,2] 陈振宇 陈鑫[1,3] 李彬[1,3] 翟娟[1,2] SHEN Wei-Jun1,2, TANG En-Yi1,2, CHEN Zhen-Yu1,2, CHEN Xin1,3, LI Bin1,3, ZHAI Juan1,2(1.State Key Laboratory for Novel Software Technology (Nanjing University), Nanjing 210023, China; 2.Software Institute, Nanjing University, Nanjing 210093, China;3.Department of Computer Science and Technology, Nanjing University, Nanjing 210023, China)
机构地区:[1]计算机软件新技术国家重点实验室(南京大学),江苏南京210023 [2]南京大学软件学院,江苏南京210093 [3]南京大学计算机科学与技术系,江苏南京210023
出 处:《软件学报》2018年第5期1230-1243,共14页Journal of Software
基 金:国家自然科学基金(61772260;61402222;61373013);国家重点基础研究发展计划(973)(2014CB340700);江苏省产学研前瞻项目(BY2015069-03)~~
摘 要:安全漏洞检测,是保障软件安全性的重要手段.随着互联网的发展,黑客的攻击手段日趋多样化,且攻击技术不断翻新,使软件安全受到了新的威胁.描述了当前软件中实际存在的一种新类型的安全漏洞隐患,称为数值稳定性相关的安全漏洞隐患.由于黑客可以利用该类漏洞绕过现有的防护措施,且已有的数值稳定性分析方法很难检测到该类漏洞的存在,因而这一新类型的漏洞隐患十分危险.面对这一挑战,首先从数值稳定性引起软件行为改变的角度定义了数值稳定性相关的安全漏洞隐患,并给出了对应的自动化检测方法.该方法基于动静态相结合的程序分析与符号执行技术,通过数值变量符号式提取、静态攻击流程分析以及高精度动态攻击验证这3个步骤来检测和分析软件中可能存在的数值稳定性相关安全漏洞.在业界多个著名开源软件上进行了实例研究,实验结果表明:该方法能够有效检测到实际软件中真实存在的数值稳定性相关漏洞隐患.Vulnerability detection is an important way of improving the security of software. However, the development of the Internet makes it possible for hackers to attack software systems with new techniques. This paper focuses on a new kind of vulnerability that relates to numerical stability. It poses new threat to software security as hackers are able to bypass security protection by the new kind of vulnerability, and numerical analysis is difficult to detect such a vulnerability. In the paper, the vulnerability related to numerical stability is defined from the perspective of software behavior variation caused by numerical errors, and an automatic detection approach is proposed. The approach combines the static analysis and symbolic execution, and detects the vulnerability by three steps: symbolic extraction, static attack analysis, and dynamic attack verification with high precision values. This new approach is evaluated on a few famous open source projects. The results show that the proposed approach effectively detects the vulnerabilities related to numerical stability hidden in the real-world projects.
分 类 号:TP311[自动化与计算机技术—计算机软件与理论]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.15