Netinfo Security ›› 2016, Vol. 16 ›› Issue (3): 77-83.doi: 10.3969/j.issn.1671-1122.2016.03.013

• Orginal Article • Previous Articles     Next Articles

Review on Dynamic Taint Analysis of Binary Programs

Zheng SONG, Yongjian WANG, Bo JIN, Jiuchuan LIN()   

  1. Key Laboratory of Information, Network and Security, Ministry of Public Security, The Third Research Institute of Ministry of Public Security, Shanghai 201204, China
  • Received:2016-01-10 Online:2016-03-25 Published:2020-05-13

Abstract:

With the network security situation becoming increasingly worsening, detection technology that can timely and effectivly discover exploits and related advanced persistent threat(APT) attacks is of vital importance for network security. Dynamic taint analysis, which is one of the reliable exploit detection solutions, is a method that marks the non-trusted input source as tainted data, and tracks its spread with the execution of program to get the key position and data associated with the input. This paper firstly introduces the principle of dynamic taint analysis of binary programs and its development status in several typical systems, then analyzes existing problems with dynamic taint analysis of binary programs, and finally introduces the application of dynamic taint analysis. In this paper, the dynamic taint analysis technology of binary program is introduced in details, which is helpful to improve the network security protection level for important information system.

Key words: dynamic taint analysis, network security, information flow tracking

CLC Number: