Flash bug detection method based on virtual execution mode

A virtual execution and vulnerability detection technology, applied in the direction of program/content distribution protection, platform integrity maintenance, etc., can solve problems such as low efficiency, achieve high efficiency, high correct rate, and low false positive rate

Inactive Publication Date: 2014-09-17
中科博华信息科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the traditional virtual execution method needs to run Flash files, so the efficiency is low when performing vulnerability detection on a large number of Flash files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Flash bug detection method based on virtual execution mode
  • Flash bug detection method based on virtual execution mode
  • Flash bug detection method based on virtual execution mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0081] figure 1 It is a flowchart of the present invention, and the steps are as follows:

[0082] (1) Decompile the Flash file to get the ActionScript code

[0083] Since the Flash compiler converts ActionScript code into an intermediate code format called "bytecode" when compiling ActionScript code, it needs to be decompiled first.

[0084] (2) Word scanning and lexical analysis

[0085] After decompiling the ActionScript code, in order to facilitate subsequent analysis and virtual execution, the code needs to be scanned for words, that is, the ActionScript code is converted into a word stream, and the type of each word is analyzed.

[0086] For example, for the following statement: var num:int=10;, after word scanning and lexical analysis, the following word stream should be generated ("var", reserved word), ("num", identifier), (":", symbol) , ("int", reserved word), ("=", symbol), ("10", number), (";", symbol).

[0087] (3) Build a spanning tree

[0088] To facilitate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Flash bug detection method based on a virtual execution mode, comprising the following steps of: decompiling a Flash file to be detected to obtain an Action Script code; analyzing a class structure of the code; generating a plurality of virtual execution flows according to an analyzed result, wherein each virtual flow is the virtual execution of a certain section of the code; in a virtual execution process, if meeting a branched sentence, modifying the value of a corresponding variable to cover all branches; adding a new virtual execution flow to each branch to be executed; after one time of the virtual execution flow is finished, and carrying out bug matching according to the corresponding variable value or other conditions, if according with triggering conditions of a Flash bug, the bug is detected successfully, otherwise, the Flash file is indicated to be safe. The Flash bug detection method based on the virtual execution mode has the characteristics of low erroneous judgment rate and high execution efficiency.

Description

technical field [0001] The invention relates to a Flash vulnerability detection method based on a virtual execution mode. Background technique [0002] Adobe's Flash Player is currently a very widely used client player that can provide powerful and content-rich video experience on various mainstream operating systems, browsers, mobile phones and mobile devices. Now, almost most PCs or other terminals are equipped with Flash Player, but at the same time, the number of Flash Player vulnerabilities is increasing day by day, which poses a serious threat to the security of the Internet. [0003] According to the vulnerability report released by CVE, the number of Flash vulnerabilities is still increasing, and Flash Player has become the hardest hit area for hackers with the most high-risk vulnerabilities. Among the top ten security vulnerabilities in 2011, four high-risk vulnerabilities were exposed in Flash Player, which is more dangerous than Microsoft Windows operating system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F21/10
Inventor 王建新彭程聂石婧董苹苹
Owner 中科博华信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products