Bug excavation method based on executable code conversed analysis

A technology of reverse analysis and vulnerability mining, applied in the field of vulnerability mining, can solve the problems of single type of vulnerability and inability to know other problems, achieve a good vulnerability detection rate and make up for blindness

Inactive Publication Date: 2009-07-15
SHANGHAI JIAO TONG UNIV
View PDF1 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This detection technology is a kind of black box testing, and the types of vulnerabilities it finds are relativ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bug excavation method based on executable code conversed analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The embodiments of the present invention are described in detail below in conjunction with the accompanying drawings: this embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following the described embodiment.

[0016] Based on the present invention, a loophole mining method for reverse analysis of executable codes is developed, which mainly performs reverse analysis and detection of loopholes in executable codes, performs gray box detection processing on inherent loopholes and logical loopholes that may occur, and judges and locates loopholes location and associated hazards. The specific implementation method is described below:

[0017] For executable code files, it mainly refers to executable PE files under Windows. For the specific detection process, see figure 1 .

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a vulnerability evaluation method which is in the technical field of software engineering and is based on reverse analysis of executable code. Specially, a gray box detecting method is adopted for the PE format document in the Windows system. The vulnerability information of program is captured with debugging software. The alternated data and decision are dynamically analyzed through analyzing the specific code when the program is away from the safety state by the vulnerability and reversely analyzing the program instruction flow and inputting decision information. The inherent and logical vulnerabilities in the program are evaluated. The harm of vulnerability is confirmed thereby obtaining the purpose of detecting vulnerability. The vulnerability evaluation method of the invention has higher detecting efficiency, and can evaluate the logical vulnerability which is likely to be leaked from being detected in the program more successfully.

Description

technical field [0001] The present invention relates to a method for mining vulnerabilities in the field of computer technology, in particular to a method for mining vulnerabilities based on reverse analysis of executable codes. Background technique [0002] At present, there are many technologies for mining and detecting vulnerabilities, but they often consume a lot of manpower and material resources in the detection, such as the automatic mining technology using the black box method. In order to increase detection efficiency, some tools to check code security through specifications are often used in code detection. This method based on matching search can quickly detect inherent loopholes, but it cannot perform detailed detection for logical code loopholes. . Vulnerability discovery based on reverse analysis is actually a gray-box testing method, which uses reverse analysis technology to assist in the mining of vulnerabilities. It can not only directly measure the problem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/36
Inventor 薛质王轶骏施勇
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products