首页 | 本学科首页   官方微博 | 高级检索  
     


A taint based approach for automatic reverse engineering of gray-box file formats
Authors:Baojiang Cui  Fuwei Wang  Yongle Hao  Lingyu Wang
Affiliation:1.Beijing University of Posts and Telecommunications and National Engineering Laboratory for Mobile Network Security,Beijing,China;2.China Information Technology Security Evaluation Center,Beijing,China;3.Concordia Institute for Information Systems Engineering,Concordia University,Montreal,Canada
Abstract:File format vulnerabilities have been highlighted in recent years, and the performance of fuzzing tests relies heavily on the knowledge of target formats. In this paper, we present systematic algorithms and methods to automatically reverse engineer input file formats. The methodology employs dynamic taint analysis to reveal implicit relational information between input file and binary procedures, which is used for the measurement of correlations among data bytes, format segmentation and data type inference. We have implemented a prototype, and its general tests on 10 well-published binary formats yielded an average of over 85 % successful identification rate, while more detailed structural information was unveiled beyond coarse granular format analysis. Besides, a practical pseudo-fuzzing evaluation method is discussed in accordance with real-world demands on security analysis, and the evaluation results demonstrated the practical effectiveness of our system.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号