Program slicing technique-based C language dead code detection method

A program slicing and detection method technology, applied in the field of malicious code analysis, can solve problems such as inability to specifically detect dead code, not suitable for practical applications, etc., achieve high accuracy, strong pertinence, and improve detection efficiency

Inactive Publication Date: 2017-07-14
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] These code deobfuscation methods can only help the analysis of obfuscated code, but cannot specifically detect the location of dead code in the obfuscated code, restore the control flow structure, or require complex processing such as semantics and instruction recognition. Not suitable for practical application when analyzing malicious code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program slicing technique-based C language dead code detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0024] The C language dead code detection method based on program slicing starts from the C language source code with dead code inserted, uses static slicing and dynamic slicing techniques, and combines symbolic execution to detect C language dead code. figure 1 The overall process of this embodiment is given, and the specific implementation steps are as follows:

[0025] 1): Obtain C language source code that may have dead code inserted. Dead code refers to code that is inserted into the original program and will not be executed, nor will it have any impact on the running results of the original ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a program slicing technique-based C language dead code detection method. The method mainly comprises the steps of forming a slicing criterion <n,V> by an output statement in a source code and a variable set in the output statement; performing static backward program slicing analysis and dynamic backward program slicing analysis on the source code; and comparing obtained analysis results to obtain a conclusion about whether a dead code exists or not. According to the method, a dead code statement contained in a C language code can be effectively detected, and the detection accuracy and efficiency are improved.

Description

technical field [0001] The invention relates to the field of malicious code analysis, and mainly relates to a method for detecting dead codes in C language based on program slicing technology. Background technique [0002] With the widespread popularity of the Internet, today's computer networks are also facing more and more attack threats. Among many network security problems, the security hazards caused by malicious codes are becoming more and more serious. Malicious code analysis has become the focus of security professionals, and various malicious code analysis methods have been continuously proposed. However, in order to increase the difficulty for security personnel to analyze malicious code, malicious code writers often use various technical means to protect the code, and code obfuscation is one of them. Obfuscated malicious code can not only evade the detection of killing tools, but also hinder reverse engineers from conducting security analysis. [0003] Among ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
CPCG06F11/3668
Inventor 张迎周王星尹秀陈星昊赵莲
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products