《電子技術(shù)應(yīng)用》
您所在的位置:首頁(yè) > 通信與網(wǎng)絡(luò) > 設(shè)計(jì)應(yīng)用 > 基于補(bǔ)丁特性的漏洞掃描研究
基于補(bǔ)丁特性的漏洞掃描研究
信息技術(shù)與網(wǎng)絡(luò)安全
劉思琦,王一鳴
(北京交通大學(xué) 計(jì)算機(jī)與信息技術(shù)學(xué)院,北京100044)
摘要: 為抵御漏洞引發(fā)的黑客攻擊和漏洞自身產(chǎn)生的威脅,1day漏洞應(yīng)用修復(fù)的通用辦法是使用代碼匹配檢測(cè)。但目前源代碼匹配誤報(bào)率高,二進(jìn)制代碼匹配不精確且不通用。基于此,提出了一種由源代碼到二進(jìn)制的基于補(bǔ)丁特性的漏洞掃描模型——BinScan。它先形成已知漏洞數(shù)據(jù)庫(kù)并對(duì)源代碼進(jìn)行已知漏洞掃描得出漏洞檢測(cè)結(jié)果;然后利用源代碼檢測(cè)信息對(duì)打補(bǔ)丁前后源代碼編譯生成二進(jìn)制文件,形成二進(jìn)制漏洞庫(kù);最后比較目標(biāo)二進(jìn)制文件相似性,利用源代碼結(jié)果進(jìn)行檢驗(yàn)。最終生成Linux Kernel的2 700條漏洞數(shù)據(jù),15 496個(gè)patch文件,實(shí)現(xiàn)了利用源代碼檢測(cè)限制二進(jìn)制文件的漏洞檢測(cè)范圍,然后基于CFG和二進(jìn)制代碼相似性檢測(cè)補(bǔ)丁存在以檢測(cè)漏洞。檢測(cè)結(jié)果表明,此方法與其他二進(jìn)制漏洞檢測(cè)工具相比,可以將源代碼級(jí)的漏洞掃描能力應(yīng)用于二進(jìn)制,是有效的。
中圖分類號(hào): TP309
文獻(xiàn)標(biāo)識(shí)碼: A
DOI: 10.19358/j.issn.2096-5133.2021.07.009
引用格式: 劉思琦,王一鳴. 基于補(bǔ)丁特性的漏洞掃描研究[J].信息技術(shù)與網(wǎng)絡(luò)安全,2021,40(7):52-58.
Research on vulnerability scanning based on patch characteristics
Liu Siqi,Wang Yiming
(School of Computer and Information Technology,Beijing Jiaotong University,Beijing 100044,China)
Abstract: In order to resist the hacker attack caused by the vulnerability and the threat generated by the vulnerability itself, the general method of 1day vulnerability application repair is to use code matching to detect. But at present, the false alarm rate of source code matching is high, and the binary code similarity matching is not accurate and universal. Based on this, this paper proposes a vulnerability scanning model from source code to binary code, BinScan, which is based on patch features. Firstly, it forms a known vulnerability database and scans the source code for known vulnerabilities to obtain the vulnerability detection results; then it uses the source code detection information to compile the source code before and after the patch to generate a binary file and to form a binary vulnerability library; finally it compares the target binary files for similarity performance, using the source code results for verification. In the end, this paper generates 2 700 vulnerability data and 15 496 patch files of Linux Kernel. It has been realized to use source code detection to limit the vulnerability detection range of binary files, and to detect the existence of patches based on the similarity of CFG and binary code to detect vulnerabilities. The detection results show that compared with other binary vulnerability detection tools, this method can apply source code level vulnerability scanning capabilities to binary and is effective.
Key words : patch characteristics;vulnerability scanning;binary;source code;security

0 引言

 在時(shí)間維度上,漏洞都會(huì)經(jīng)歷產(chǎn)生、發(fā)現(xiàn)、公開(kāi)和消亡等過(guò)程,不同的時(shí)間段,漏洞有不同的名稱和表現(xiàn)形式。1day漏洞是指在廠商發(fā)布安全補(bǔ)丁之后,大部分用戶還未打補(bǔ)丁的漏洞,此類漏洞依然具有可利用性。在各類型軟件中,許多漏洞的壽命超過(guò)12個(gè)月,針對(duì)此類漏洞的通用應(yīng)用修復(fù)辦法是使用代碼匹配[1],但是往往通過(guò)補(bǔ)丁做出的修補(bǔ)都是一些細(xì)微的變化,這會(huì)導(dǎo)致許多代碼匹配的方法不精確且不通用,造成結(jié)果高誤報(bào)。




本文詳細(xì)內(nèi)容請(qǐng)下載:http://www.xxav2194.com/resource/share/2000003678




作者信息:

劉思琦,王一鳴

(北京交通大學(xué) 計(jì)算機(jī)與信息技術(shù)學(xué)院,北京100044)


此內(nèi)容為AET網(wǎng)站原創(chuàng),未經(jīng)授權(quán)禁止轉(zhuǎn)載。
主站蜘蛛池模板: 久久久久久久久亚洲| 人妻互换一二三区激情视频| 91天堂素人精品系列网站| 日本免费xxxx色视频| 亚洲欧美日韩中字综合| 一级午夜a毛片免费视频| 欧美大片全黄在线观看| 厨房切底征服麻麻| 麻豆麻豆必出精品入口| 天堂中文资源网| 久99久无码精品视频免费播放| 欧美另类z0z免费观看| 变态Sm天堂无码专区| 精品国产无限资源免费观看| 在线观看噜噜噜私人影院| 中文无码一区二区不卡αv| 欧美18-19sex| 亚洲美女大bbbbbbbbb| 很黄很黄的网站免费的| 天天做天天摸天天爽天天爱 | 少妇无码AV无码一区| 久久精品aⅴ无码中文字字幕重口| 欧美精品一区二区精品久久| 免费观看黄网站| 蜜中蜜3在线观看视频| 国产福利免费视频| 中文字幕欧美日韩一| 欧美videos另类极品| 亚洲视频精品在线| 给我看播放片免费高清| 国产成人AAAAA级毛片| 3d动漫精品啪啪一区二区中文 | 成人午夜18免费看| 久久国产精品波多野结衣AV| 欧美啊v在线观看| 亚洲精品线在线观看| 精品人人妻人人澡人人爽人人 | 日本一卡精品视频免费| 亚洲av无码精品国产成人| 欧美精品第一页| 免费a级毛片在线播放|