《電子技術(shù)應(yīng)用》
您所在的位置:首頁(yè) > 通信與網(wǎng)絡(luò) > 設(shè)計(jì)應(yīng)用 > 基于補(bǔ)丁特性的漏洞掃描研究
基于補(bǔ)丁特性的漏洞掃描研究
信息技術(shù)與網(wǎng)絡(luò)安全
劉思琦,王一鳴
(北京交通大學(xué) 計(jì)算機(jī)與信息技術(shù)學(xué)院,北京100044)
摘要: 為抵御漏洞引發(fā)的黑客攻擊和漏洞自身產(chǎn)生的威脅,1day漏洞應(yīng)用修復(fù)的通用辦法是使用代碼匹配檢測(cè)。但目前源代碼匹配誤報(bào)率高,二進(jìn)制代碼匹配不精確且不通用。基于此,提出了一種由源代碼到二進(jìn)制的基于補(bǔ)丁特性的漏洞掃描模型——BinScan。它先形成已知漏洞數(shù)據(jù)庫(kù)并對(duì)源代碼進(jìn)行已知漏洞掃描得出漏洞檢測(cè)結(jié)果;然后利用源代碼檢測(cè)信息對(duì)打補(bǔ)丁前后源代碼編譯生成二進(jìn)制文件,形成二進(jìn)制漏洞庫(kù);最后比較目標(biāo)二進(jìn)制文件相似性,利用源代碼結(jié)果進(jìn)行檢驗(yàn)。最終生成Linux Kernel的2 700條漏洞數(shù)據(jù),15 496個(gè)patch文件,實(shí)現(xiàn)了利用源代碼檢測(cè)限制二進(jìn)制文件的漏洞檢測(cè)范圍,然后基于CFG和二進(jìn)制代碼相似性檢測(cè)補(bǔ)丁存在以檢測(cè)漏洞。檢測(cè)結(jié)果表明,此方法與其他二進(jìn)制漏洞檢測(cè)工具相比,可以將源代碼級(jí)的漏洞掃描能力應(yīng)用于二進(jìn)制,是有效的。
中圖分類號(hào): TP309
文獻(xiàn)標(biāo)識(shí)碼: A
DOI: 10.19358/j.issn.2096-5133.2021.07.009
引用格式: 劉思琦,王一鳴. 基于補(bǔ)丁特性的漏洞掃描研究[J].信息技術(shù)與網(wǎng)絡(luò)安全,2021,40(7):52-58.
Research on vulnerability scanning based on patch characteristics
Liu Siqi,Wang Yiming
(School of Computer and Information Technology,Beijing Jiaotong University,Beijing 100044,China)
Abstract: In order to resist the hacker attack caused by the vulnerability and the threat generated by the vulnerability itself, the general method of 1day vulnerability application repair is to use code matching to detect. But at present, the false alarm rate of source code matching is high, and the binary code similarity matching is not accurate and universal. Based on this, this paper proposes a vulnerability scanning model from source code to binary code, BinScan, which is based on patch features. Firstly, it forms a known vulnerability database and scans the source code for known vulnerabilities to obtain the vulnerability detection results; then it uses the source code detection information to compile the source code before and after the patch to generate a binary file and to form a binary vulnerability library; finally it compares the target binary files for similarity performance, using the source code results for verification. In the end, this paper generates 2 700 vulnerability data and 15 496 patch files of Linux Kernel. It has been realized to use source code detection to limit the vulnerability detection range of binary files, and to detect the existence of patches based on the similarity of CFG and binary code to detect vulnerabilities. The detection results show that compared with other binary vulnerability detection tools, this method can apply source code level vulnerability scanning capabilities to binary and is effective.
Key words : patch characteristics;vulnerability scanning;binary;source code;security

0 引言

 在時(shí)間維度上,漏洞都會(huì)經(jīng)歷產(chǎn)生、發(fā)現(xiàn)、公開(kāi)和消亡等過(guò)程,不同的時(shí)間段,漏洞有不同的名稱和表現(xiàn)形式。1day漏洞是指在廠商發(fā)布安全補(bǔ)丁之后,大部分用戶還未打補(bǔ)丁的漏洞,此類漏洞依然具有可利用性。在各類型軟件中,許多漏洞的壽命超過(guò)12個(gè)月,針對(duì)此類漏洞的通用應(yīng)用修復(fù)辦法是使用代碼匹配[1],但是往往通過(guò)補(bǔ)丁做出的修補(bǔ)都是一些細(xì)微的變化,這會(huì)導(dǎo)致許多代碼匹配的方法不精確且不通用,造成結(jié)果高誤報(bào)。




本文詳細(xì)內(nèi)容請(qǐng)下載:http://m.xxav2194.com/resource/share/2000003678




作者信息:

劉思琦,王一鳴

(北京交通大學(xué) 計(jì)算機(jī)與信息技術(shù)學(xué)院,北京100044)


此內(nèi)容為AET網(wǎng)站原創(chuàng),未經(jīng)授權(quán)禁止轉(zhuǎn)載。
主站蜘蛛池模板: 又黄又爽免费视频| 在线观看免费为成年视频| 亚洲人成精品久久久久| 精品久久久久久无码中文野结衣| 国产精品999| www.午夜视频| 日本免费小视频| 亚洲国产一区在线观看| 秋葵视频在线观看在线下载 | 多女多p多杂交视频| 久久久受www免费人成| 欧美人与动另类在线| 人体大胆做受免费视频| 美女被狂揉下部羞羞动漫| 国产污视频在线观看| 99久久人妻无码精品系列蜜桃| 成人黄色免费网址| 久久精品一本到99热免费| 欧美日在线观看| 免费国产污网站在线观看| 色综合蜜桃视频在线观看| 国产男女野战视频在线看| 99视频精品全部在线观看| 成人深夜视频在线观看| 久久精品中文字幕大胸| 欧美午夜精品久久久久免费视 | 色噜噜亚洲精品中文字幕| 国产福利一区二区三区在线视频 | h小视频在线观看| 在线观看国产欧美| 一级黄色香蕉视频| 日本免费人成视频播放| 亚1州区2区三区4区产品| 欧美综合图区亚欧综合图区| 免费观看性欧美一级| 色综合合久久天天给综看 | 久久久久成人片免费观看蜜芽| 欧美jlzz18性欧美| 亚洲欧美不卡视频在线播放| 男人j桶进女人p无遮挡在线观看| 啊灬啊别停灬用力啊公阅读|