Taint analyzing method based on taint invariable set
A taint analysis and taint technology, applied in the field of computer software security testing, can solve problems such as low applicability, unsupported data processing, incomplete taint analysis, etc., to achieve the effect of low resource consumption and reduction of false alarm rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0066] Step 1: Obtain the original taint data original_set through the traditional stain analysis method. The traditional stain analysis method is to mark common sources of stains, taking disk files as an example. Use the API provided by Pin to instrument operating system functions, such as open, read, mmap, etc., because operations on disk files generally use these functions. It should be noted that the functions that need to be instrumented are different for different operating systems. Taking Windows as an example, the functions that need to be instrumented are OpenFile, ReadFile, etc.
[0067] Step 2: Obtain the invariable_set of the stain invariant.
[0068] Step 2.1: Execute the program p whose input is input, and get the set var_set of all variables and their values, where input refers to the set of assignments to the externally accepted input;
[0069] Step 2.2: The number of initialization cycles is 0;
[0070] Step 2.3: When the number of cycles is less than the threshold,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 