信息网络安全 ›› 2017, Vol. 17 ›› Issue (9): 5-5.doi: 10.3969/j.issn.1671-1122.2017.09.002

• • 上一篇    下一篇

一种基于补丁比对和静态污点分析的漏洞定位技术研究

达小文(), 毛俐旻, 吴明杰, 郭敏   

  1. 北京计算机技术及应用研究所,北京 100854
  • 收稿日期:2017-08-01 出版日期:2017-09-20 发布日期:2020-05-12
  • 作者简介:

    作者简介: 达小文(1989—),男,湖南,助理工程师,硕士,主要研究方向为信息安全;毛俐旻(1977—),女,湖北,高级工程师,博士,主要研究方向为信息安全; 吴明杰(1987—),男,江苏,工程师,硕士,主要研究方向为信息安全;郭敏(1991—),女,山东,助理工程师,硕士,主要研究方向为信息安全。

Research on a Vulnerability Location Technology Based on Patch Matching and Static Taint Analysis

Xiaowen DA(), Limin MAO, Mingjie WU, Min GUO   

  1. Beijing Institute of Computer Technology and Applications, Beijing 100854, China
  • Received:2017-08-01 Online:2017-09-20 Published:2020-05-12

摘要:

目前对于开源软件的漏洞定位分析较为缺乏,且缺少一种自动化的快速定位方法。针对这些不足,文章提出一种基于补丁比对和静态污点分析的漏洞定位方法。该方法通过分析大量开源软件的缓冲区溢出错误的实例,提取6种缓冲区错误的漏洞定位模型;通过将补丁比对和污点传播结合,生成污点传播路径图;将补丁源码的污点传播路径图与定位模型匹配以定位某小块代码,采用污点查找精确定位漏洞所在行。

关键词: 漏洞定位, 补丁比对, 污点分析, 缓冲区错误

Abstract:

At present, there is a lack of the analysis for vulnerabilities location in open source software and a lack of an automatic method for fast locating the vulnerabilities. To address these issues, this paper proposes a vulnerabilities location method based on patch matching and the static taints analysis. By analyzing a large number of buffer errors instances of open source software, six vulnerabilities location models of buffer errors are extracted. By combining patch matching with taint propagation, a taint propagation path graph is generated. Match the taint propagation graph of patched source with the location models to locate a small block of code, which then locates vulnerabilities code rows accurately by searching for taints.

Key words: vulnerability location, patch matching, taint analysis, buffer errors

中图分类号: