Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method of mining and analyzing information security vulnerabilities

A technology of information security and analysis methods, applied in computer security devices, special data processing applications, instruments, etc., can solve problems such as high rate of false positives and false positives, damage to user programs, failure to detect applications, etc., to achieve false negatives and false positives Low reporting rate, reduced computing load, and the effect of defending against secondary attacks

Active Publication Date: 2018-12-14
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of the Internet industry, the scale and complexity of software systems are constantly increasing, but at the same time, it inevitably leads to the emergence of more and more security vulnerabilities, among which the most representative one is buffer overflow. Vulnerabilities, format string vulnerabilities, SQL injection vulnerabilities, and cross-site scripting vulnerabilities, etc. Attackers can use these vulnerabilities to change the original execution process of the program, execute the attacker's own malicious code, destroy user programs or steal user sensitive information
Although in-depth research on vulnerability attack detection has been carried out at home and abroad, there are still many shortcomings in these technologies. For example, the detection technology based on dynamic tracking of taint information during program compilation cannot detect applications written in non-type-safe languages. Program; detection technology based on source code analysis cannot detect vulnerability attacks against third-party libraries, and lacks support for runtime information, resulting in a high rate of false positives and false negatives

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of mining and analyzing information security vulnerabilities
  • A method of mining and analyzing information security vulnerabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The principles and features of the present invention will be described below in conjunction with the accompanying drawings, and the enumerated embodiments are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0026] The attack process of a general vulnerability is usually as follows: once the attacker discovers a security hole in the software system, he will find an opportunity to send the shellcode code and malicious attack string as the core of the overflow program and worm virus to the host running the software system through the network , and the software system will put the received external data into the memory buffer, these external data will cause the memory buffer to overflow, and then overwrite the return address or function pointer of the normal function, resulting in a change in the software system process, and then run the attacker's prior The set shellcode code attacks the user's host. Through t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method of mining and analyzing information security vulnerabilities. The method comprises the following steps: establishing a configuration file for an object program, wherein a series of stain analysis strategies are described in the configuration file; starting object program by a dynamic binary pile insertion frame Pin, and initializing the dynamic pile insertion analysis tool PinTool; analyzing the conditional transfer instructions of the target program through the PinTool, and generating the control flow chart and control dependency information data for the target program. The staked object accesses PinTool and user-defined library files to complete the marking of the stain flow, propagation and vulnerability detection. The invention realizes the propagationof stain marks from two aspects of data flow and control flow. The invention can detect and prevent external untrusted data from being used for unsafe data operation, does not need to analyze the source code of the target program, has low computational load, is suitable for commercial software without open source, can defend the secondary attack based on the same vulnerability by extracting the signature, and has lower rate of omission and false positives than the existing vulnerability detection technology.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for mining and analyzing information security loopholes. Background technique [0002] With the rapid development of the Internet industry, the scale and complexity of software systems are constantly increasing, but at the same time, it inevitably leads to the emergence of more and more security vulnerabilities, among which the most representative one is buffer overflow. Vulnerabilities, format string vulnerabilities, SQL injection vulnerabilities, and cross-site scripting vulnerabilities, etc., attackers can use these vulnerabilities to change the original execution process of the program, execute the attacker's own malicious code, destroy user programs or steal user sensitive information. Although in-depth research on vulnerability attack detection has been carried out at home and abroad, there are still many shortcomings in these technologies. For example, the dete...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F17/30
CPCG06F21/577
Inventor 许爱东戴涛陈华军樊凯蒙家晓关泽武
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More