Test data generating device and method based on binary program

A binary program and test data technology, applied in software security analysis, communication and computer fields, can solve problems such as many uncertain factors, path explosion, difficulty in approximating paths and timing attributes, etc., to improve effectiveness and accuracy, and improve accuracy. degree, the effect of alleviating the path explosion problem

Inactive Publication Date: 2010-05-26
BEIJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The advantages of symbolic execution analysis technology are: the analysis is path-sensitive; because there is no approximation to the path and state, the result is accurate; it is suitable for state checking and timing checking; it is very effective for concurrent errors; Approximation may lead to inaccurate results; exhaustive search for all possible states is expensive; it is difficult to approximate path and timing attributes at the boundary, so compounding is difficult
[0006] Based on the above, there are some problems in the current mainstream static analysis technology and dynamic analysis technology: (1) dynamic test automatically generates test data, but there are many uncertain factors in the test, which has a certain degree of blindness; (2) the efficiency of static analysis Higher, the analysis is path-sensitive, but in theory there is a high rate of false negatives and false positives, it is difficult to accurately locate the vulnerability; most static analysis needs to be analyzed on the basis of obtaining the source code, and it is aimed at the symbolic execution of the binary program The technology is complex; symbolic execution can automatically generate test data for path traversal, but the execution path is not targeted, and there is a problem of path explosion. It is not realistic to automatically generate test data for complete path-sensitive analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Test data generating device and method based on binary program
  • Test data generating device and method based on binary program
  • Test data generating device and method based on binary program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047]In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings.

[0048] The first embodiment of the present invention provides a binary program-based test data generator. The binary program-based test data generator starts from the initial test data based on the binary program, and combines actual execution and symbolic execution to solve the problems faced by software security detection. question. In order to alleviate the problem of path explosion, the binary program-based test data generator focuses on the code parts that have security risks. The input points based on the initial test data of the binary program are actually executed along all possible different paths to the test data set of the target code segment. Its structural principle diagram is as follows figure 1 shown, including the following modules:

[0049] A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to test data generating device and method based on a binary program. The test data generating method mainly comprises the following steps of: operating a dynamic symbol executing program for the state information of the binary program which corresponds to a guide path and initial test data; obtaining corresponding conditional jump address information according to an operating result; matching an actual operation path which corresponds to the initial test data with the guide path on the basis of the obtained conditional jump address information; and generating the test data which corresponds to the actual operation path and is matched with the guide path. The invention combines the advantages of static analysis and dynamic analysis and can enhance the availability and the accuracy of symbolic execution and the accuracy degree of the generated test data and generate the test data used for carrying out path sensitivity analysis on a key code segment, thereby effectively mitigating the problem of path explosion in the symbolic execution.

Description

technical field [0001] The present invention relates to the field of communications and computers, in particular to the field of software security analysis. Background technique [0002] At present, in the field of software security research, software security analysis is often carried out, and a major problem in the process of security analysis is to generate test data with a certain degree of coverage. Whether in academia or industry, common security analysis methods are divided into two types: dynamic analysis method and static analysis method. [0003] The method of dynamic analysis is to run the target program to be analyzed, and set different input parameters artificially, so that the target program runs in different states, so as to observe the internal situation of the program or the errors generated during the operation, so as to find security defects. The most commonly used method in dynamic analysis is FuzzTesting (fuzz testing, also known as random number black ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
Inventor 崔宝江王禹洪海
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products