Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-vulnerability mining method and device based on code injection

A vulnerability mining and code injection technology, which is applied in program code conversion, computer security devices, decompilation/disassembly, etc., can solve the problems of third-party dll library call failure, inability to achieve cross-platform protection, etc., to prevent and block exceptions Effects of monitoring, reducing efficiency, hindering execution efficiency

Active Publication Date: 2021-01-01
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention aims at the problem that the current anti-fuzzing testing method is only applicable to the protection of the main program, and the call to the third-party dll library is invalid, and is limited to the x86 architecture, and cannot realize cross-platform protection, and proposes an anti-vulnerability mining method based on code injection And devices, which can effectively protect binary programs from the impact of fuzzing and mining vulnerabilities, and support the call of third-party dll libraries

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-vulnerability mining method and device based on code injection
  • Anti-vulnerability mining method and device based on code injection
  • Anti-vulnerability mining method and device based on code injection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further explained below in conjunction with accompanying drawing and specific embodiment:

[0045] Such as figure 1 As shown, an anti-vulnerability mining method based on code injection includes:

[0046] Step S101: Based on the built common function library, perform static analysis on the target binary program;

[0047] Step S102: converting binary programs from different sources into a unified LLVM (Low Level Virtual Machine) intermediate representation;

[0048] Step S103: Perform pseudo-code block injection on the basis of obtaining the LLVM intermediate representation.

[0049] Further, the step S101 includes:

[0050] Step S101.1: Decompile all binary programs by using the existing network test set, identify memory access functions and error handling functions, and build a function library;

[0051] Step S101.2: Perform IDA reverse analysis on the library function in step S101.1, extract the control flow graph, identify the import a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of software security protection, and discloses an anti-vulnerability mining method and device based on code injection. The method comprises the steps: recognizing an import and export table, a low-frequency path and a high-frequency path of a target program for a known binary program through static analysis, and determining a call relation; converting the target program into a unified intermediate representation, and respectively inserting pseudo code blocks in the low frequency and the high frequency to reduce the efficiency of the fuzzy tester; and finally, packaging and publishing the modified binary program again. According to the method, the binary program can be effectively protected from being influenced by fuzzy test mining vulnerabilities, and calling of a third-party dll library is supported.

Description

technical field [0001] The invention belongs to the technical field of software security protection, and in particular relates to an anti-leakage mining method and device based on code injection. Background technique [0002] Fuzz testing is a black-box testing technique that monitors program execution by randomly generating a large number of input samples to find bug-exposing behaviors such as crashes or hangs. Vulnerability mining technology centered on fuzz testing has the widest application range and the most remarkable actual mining effect among many current vulnerability mining technologies. For example, Google used the large-scale fuzz testing tool OSS-Fuzz to discover more than 9,000 vulnerabilities within two years. For developers, fuzz testing can help them conduct security testing in the software development process. Unfortunately, attackers can also use fuzz testing technology to discover 0-day vulnerabilities, which brings benefits for attackers to conduct syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/57G06F8/53
CPCG06F21/563G06F21/577G06F8/53
Inventor 武泽慧魏强袁会杰杜江周国淼黄辉辉
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products