System for detecting software bug triggered during practical running of computer program

A computer program and actual operation technology, applied in the field of detection systems that trigger software vulnerabilities, can solve problems such as failure to detect vulnerabilities, inability to directly analyze binary codes, large time and system resource overhead, etc., to improve software vulnerabilities and vulnerabilities Possibility, high program executable path coverage, and the effect of reducing resource and time overhead

Inactive Publication Date: 2012-09-05
SHANGHAI JIAOTONG UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, both dynamic program analysis and static program analysis have their insurmountable shortcomings
For dynamic program analysis technology, because the program can only be executed along one path during each dynamic execution, in order to achieve satisfactory path coverage, we must repeat the dynamic analysis for a sufficient number of times, but even so It is also difficult to achieve 100% path coverage
For static program analysis technology, although it can achieve 100% program path coverage, it cannot detect those vulnerabilities that are triggered when the program is actually running, and the false alarm rate of general vulnerabilities is high. Static analysis of an entire large program can incur significant time and system resource overhead
More importantly, existing related systems often require program source code to perform program analysis and vulnerability detection, and cannot directly analyze the binary code of the target program. This shortcoming also limits the use of these systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for detecting software bug triggered during practical running of computer program
  • System for detecting software bug triggered during practical running of computer program
  • System for detecting software bug triggered during practical running of computer program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The embodiments of the present invention will be described in detail below with reference to the accompanying drawings. This embodiment is implemented on the premise of the technical solution of the present invention. Detailed implementation modes and specific operation procedures are given, but the protection scope of the present invention is not limited to the following Mentioned examples.

[0020] Such as figure 1 As shown, this embodiment includes: a binary code dynamic insertion module, a program basic block identification module, a function call graph building module, a control flow graph building module, a function identification module, and a static analysis module. The binary code dynamic insertion module can insert the user-defined analysis code into any position of the program, and track the system API called by the program, and finally return the analysis result through the callback function provided by the custom program analysis file and pass it to the program...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a system for detecting a software bug triggered during practical running of a computer program in the technical field of computers. The system comprises a binary code dynamic inserting module, a program basic block recognizing module, a function call graph constructing module, a control flow graph constructing module, a function recognizing module and a static analysis module. By combining two technologies of dynamic program analysis and static analysis path complementation, the invention not only can detect the bugs which can be triggered during the practical runningof the program but also can reach higher program path coverage rate, carry out bug detects on the path which is not covered in the dynamic analysis process, improve the success rate of bug detection and reduce the false rate of the bugs. Meanwhile, the static analysis path complementation technology only analyzes a path which is not executed in dynamic analysis instead of all program paths, thereby greatly reducing the cost on time and system resources.

Description

Technical field [0001] The present invention relates to a detection system in the field of computer technology, in particular to a detection system that triggers software vulnerabilities when a computer program is actually running. Background technique [0002] Program analysis technology refers to the analysis technology that deduces the structure and data flow of a computer program. In the process of software maintenance testing and software understanding, we need to analyze the structure and data flow of the target program. The output of the program analysis system is generally a data flow diagram and a control flow diagram. The data flow diagram expresses the process of information transformation and transmission in the program system by means of diagrams, especially when data is referenced and defined; the control flow diagram often uses a diagram or abstract syntax tree to describe the program structure. [0003] Dynamic program analysis technology is a technology to analyze...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
Inventor 张若愚王卓周侃黄实秋黄山
Owner SHANGHAI JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products