期刊文献+

基于Fuzzing的Web控件漏洞检测改进模型

Improved Web controls vulnerability detection model based on Fuzzing
在线阅读 下载PDF
导出
摘要 Web软件安全漏洞层出不穷,攻击手段日益变化,为分析现有的Web控件漏洞检测方法,提出基于Fuzzing测试方法的Web控件漏洞检测改进模型。该系统从功能上分为五大模块进行设计和实现,并结合静态分析与动态分析技术检测WebActiveX控件模型的漏洞,给出"启发式规则"来优化测试数据生成引擎。实例测试结果表明,Web控件漏洞的Fuzzing测试模型是有效和可行的,并能妥善处理好交互性问题。 The number of security vulnerabilities in the ActiveX controls has increased a lot in resent years. Once illegally used, these vulnerabilities could lead to serious consequences, in order to improve the existing vulnerabilities detection method, we present a new Fuzzing-based Web controls vulnerability detection model. The system is divided into five modules for design and implementation. We combines static analysis and dynamic analysis techniques to detect Web ActiveX control vulnerability, gives "heuristic rules" to optimize the test data generation engine. Example test results show that our Fuzzing-based Web control vulnera- bility testing model is effective , feasible, and can properly deal with the interaction problem.
出处 《微型机与应用》 2012年第4期85-88,共4页 Microcomputer & Its Applications
基金 国家自然科学基金项目(61070164) 广东省省部产学研基金项目(2008B090500201) 广东省教育厅广东高校科技成果转化重大项目(cgzhzd0807) 广东省科技计划项目(2009B010800023)
关键词 FUZZING测试 WEB控件 漏洞检测 漏洞分析 Fuzzing test Web controls vulnerabilities detection vulnerability analysis
  • 相关文献

参考文献6

二级参考文献36

  • 1David Wagne. A first step towards automated detection of buffer overrun vulnerabilities
  • 2David Chandler, David Melski, David Vitek. Buffer Overrun Detection using Linear Programming and Static Analysis[C]. ACM 2003
  • 3Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha,ThomasW. Reps, and Randal E. Bryant[C]. Automatic Discovery of API-Level Exploits. ACM 2005
  • 4Jan K. Rutkowski. Execution path analysis
  • 5V. Benjamin Livshits and Monica S. Lam. Tracking Pointers with Path and Context Sensitivity for Bug Detection in C Programs[C]. ACM 2003
  • 6Cynthia Phillips, Laura Painton Swiler. A graphbased system for network vulnerability analysis[C]. ACM 1999
  • 7Paul Ammann, Duminda Wijesekera, and Saket Kaushik. Analysis and verification -Scalable, graph-based network vulnerability analysis[C]. ACM 2002
  • 8Todd Sabin. Comparing binaries with graph isomorphisms
  • 9Halvar Flake. Structural Comparison of Executable Objects
  • 10James Newsome and Dawn Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature-Generation of Exploits on Commodity Software[C]. NDSS Conference Proceedings, 2004

共引文献64

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部