Unlock instant, AI-driven research and patent intelligence for your innovation.

Automatic heap utilization primitive acquisition method

A technology of collection methods and primitives, applied in the field of information security, which can solve problems such as ambiguity and test case redundancy

Pending Publication Date: 2021-03-16
ZHONGKE INFORMATION SECURITY COMMON TECH NAT ENG RES CENT CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Third, the test cases generated by fuzz testing are usually redundant and fuzzy, so users need to spend non-negligible time and effort to analyze the final results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0013] A kind of automatic heap utilization primitive collection method of the present invention comprises the following steps:

[0014] Step 1: Generate test cases and randomly generate five types of heap-related operations, including allocation, recycling, buffer writing, heap writing, and bug calls;

[0015] Step 2: Crash detection: confirm whether the executed test case will cause the impact of exploitation;

[0016] Step 3: Test reduction: Use the delta-debugging algorithm t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An automatic heap utilization primitive acquisition method comprises the following steps: generating a test case, and randomly generating five types of heap related operations which specifically comprise allocation, recovery, buffer area writing, heap writing and bug calling; crash detection: confirming whether the executed test case can cause the influence of utilization or not; test reduction: refining the test cases by using delta-debugging algorithm; and POC generation: after reducing the test triggering the vulnerability, converting the encoded test case into a readable PoC code by usingone-to-one mapping between each heap operation and the C code. The method has the advantages that compared with the prior art, the known utilization technology can be verified, and the unknown technology can be found. In the absence of a development-specific guideline, the present technology can freely explore and find a search space for a heap utilization technology, thereby increasing the probability of meeting certain utilization technology preconditions.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for collecting automatic heap utilization primitives. Background technique [0002] Control of computer processes is usually done by primitives. The so-called primitive generally refers to a program segment composed of several instructions, which is used to realize a specific function and cannot be interrupted during execution. In the operating system, some operations called by the process, such as queue operations, operations on semaphores, check and start peripheral operations, etc., cannot be interrupted once they start to execute, otherwise operation errors will occur, causing system confusion. Therefore, these operations must be implemented with primitives, which are an integral part of the core of the operating system (not a process, but a set of program modules), and reside in memory, and are usually executed in managed mode. [0003] Heap-related v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F11/36
CPCG06F11/3684G06F11/3688G06F21/577
Inventor 刘元王庆贺
Owner ZHONGKE INFORMATION SECURITY COMMON TECH NAT ENG RES CENT CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More