A Taint Analysis Method Based on Taint Invariant Set
A taint analysis and taint technology, applied in the field of computer software security testing, can solve problems such as low applicability, no support for data processing, difficult application of taint analysis technology, etc., and achieve the effect of reducing false alarm rate and low resource consumption.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0066] Step 1: Obtain the original taint data original_set through the traditional taint analysis method. Among them, the traditional taint analysis method is to mark common taint sources, taking disk files as an example. Insert operating system functions through the API provided by Pin, such as: open, read, mmap, etc., because operations on disk files generally use these functions. It should be noted that different operating systems require different functions that require instrumentation. Taking Windows as an example, the functions that require instrumentation are OpenFile, ReadFile, and so on.
[0067] Step 2: Obtain the taint invariant set invariable_set.
[0068] Step 2.1: Execute the program p whose input is input, and obtain the set var_set of all variables and their values, where input refers to the set of assignments to externally accepted inputs;
[0069] Step 2.2: Initialize the number of cycles to 0;
[0070] Step 2.3: When the number of cycles is less than the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 