首页 | 本学科首页   官方微博 | 高级检索  
     

执行路径建模进程化代码分析
引用本文:林锦滨,蒋 凡.执行路径建模进程化代码分析[J].计算机工程,2010,36(9):68-69,7.
作者姓名:林锦滨  蒋 凡
作者单位:(中国科学技术大学计算机科学与技术学院,合肥 230027)
摘    要:针对符号执行分析方法路径资源消耗过大的问题,提出执行路径建模进程化的过程内分析优化方法。结合基于惰性初始化的对象建模方法,以Phoenix编译器中间表示层的代码作为直接分析对象,实现一个检测C代码漏洞的工具原型。使用该工具验证了Openssl和Apache软件的已知漏洞代码,并在wget的1.11.4版本中发现一个“拒绝服务”漏洞。

关 键 词:符号执行  静态分析  C代码  漏洞检测

Code Analysis of Modeling Execution Path as Process
LIN Jin-bin,JIANG Fan.Code Analysis of Modeling Execution Path as Process[J].Computer Engineering,2010,36(9):68-69,7.
Authors:LIN Jin-bin  JIANG Fan
Affiliation:(School of Computer Science and Technology, University of Science and Technology of China, Hefei 230027)
Abstract:Aiming at the problem that the resource consumption of symbolic execution is too large, this paper proposes an intra-procedural analysis method which is named modeling execution path as process, and combines using the method of modeling objects which is named lazy initialization. A tool prototype which can detect the vulnerability of C code is implemented, and analyzes the Intermediate Rresent(IR) of Phoenix as the direct object. Some known vulnerabilities of Openssl and Apache are verified, and a DOS vulnerability of the version 1.11.4 of wget is detected.
Keywords:symbolic execution  static analysis  C code  vulnerability detection
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号