Taint analysis framework and method supporting correlation analysis between data
A technology of taint analysis and association analysis, which is applied in the field of network and information security, can solve problems such as inability to deal with multi-taint tags, inability to perform playback performance loss, etc., to avoid the data integration process, reduce performance overhead, and achieve the effect of analysis efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] Embodiment 1: This embodiment provides a taint analysis framework that supports correlation analysis between data for binary programs, such as figure 1 As shown, the framework includes four parts, namely, the program execution track recording module, the data flow restoration module, the general taint analysis module and the data domain association analysis module; the program execution recording module is used to record the track information during the program running process; The data flow restoration module is used to restore the complete data flow propagation process of the program using the recorded program running track information; the general taint analysis interface module provides a general taint analysis interface; the data domain correlation analysis module is used to perform taint correlation analysis on multiple data domains . Each module is described in detail below.
[0041] 1. Program Execution Recording Module: online record the information content of...
Embodiment 2
[0061] Embodiment 2: This embodiment provides a taint analysis method that supports correlation analysis between data domains, and the method includes the following steps:
[0062] Step 1. Record program execution track: Use dynamic binary instrumentation technology to perform instrumentation after each module of the analyzed program is loaded, when a new thread is created, when a basic block is analyzed, when a basic block is executed, and before and after API calls. Information such as the image of each module loaded in the program, the initial context of the thread, the content of the basic block instruction, the execution sequence of the basic block, and the API call.
[0063] Step 2: Use the recorded program running information to restore the complete data flow propagation process: use the recorded program module image, initialize the context of the simulated execution according to the recorded thread initial context, and simulate and execute each one in turn according to ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



