Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Software Vulnerability Detection Method Based on Simulation Attack

A technology for simulating attacks and detection methods, applied in the field of software vulnerability detection, which can solve problems such as vulnerabilities that cannot be exploited, false positives, and lack of attack factors.

Active Publication Date: 2018-04-03
NANJING UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the use of program analysis for vulnerability detection lacks the consideration of attack factors, so that the detected vulnerabilities may not be exploitable, resulting in false positives

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Software Vulnerability Detection Method Based on Simulation Attack
  • A Software Vulnerability Detection Method Based on Simulation Attack
  • A Software Vulnerability Detection Method Based on Simulation Attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Figure 1 shows the overall structure and workflow of this method, which is divided into two stages: static analysis and dynamic detection. In the static analysis stage, the static disassembly tool IDA Pro is used to disassemble the elf file to be detected to obtain the disassembly code, and the program information, including function information and constant information, is obtained through the analysis of the disassembly code. The program information extracted by the static analysis is stored in the elf_data file for use in the dynamic detection phase. In the dynamic detection stage, use the dynamic instrumentation platform PIN to run the program to be detected, and read the program information in the elf_data file for the detection of sensitive function calls and implementation conditions. The sensitive function information in the program information includes the sensitive function call address, and the sensitive function call detection mainly detects the match betwee...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The software vulnerability detection method based on simulated attack uses static disassembly tools to obtain function information involved in sensitive operations, and uses dynamic instrumentation platform to realize monitoring, simulated attack and attack impact analysis and other processes; the main operation steps are as follows: 1) Perform static analysis Obtain program information; 2) dynamically execute programs and detect sensitive function calls; 3) analyze attack implementation conditions; 4) execute simulated attacks; 5) analyze attack impact, and determine vulnerabilities based on attack impact results; The attack simulates the attack on the program, and the corresponding vulnerability type is a type of file access vulnerability. By using this type of vulnerability, a local attacker can change the program's expected access file through a symbolic link, thereby accessing file resources beyond the attacker's permission.

Description

technical field [0001] The invention relates to the detection of software loopholes, in particular to a method for dynamic monitoring and detection of software loopholes combined with static analysis of programs and simulated attacks on the software to be detected. Background technique [0002] With the continuous development of information technology, software vulnerabilities, as one of the main threats to software system security, are becoming more and more serious. Attackers can use software vulnerabilities to access or damage the system without authorization, and even obtain the highest authority of the system. Most of the detection work for software vulnerabilities is concentrated on program analysis, and the vulnerability characteristics are extracted through static or dynamic analysis, so as to complete the vulnerability identification process. However, the use of program analysis for vulnerability detection lacks consideration of attack factors, so that the detected...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
Inventor 曾庆凯杨继龙
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products