期刊文献+

污点分析技术研究综述 被引量:19

Survey on taint analysis technology
在线阅读 下载PDF
导出
摘要 污点分析技术是保护隐私数据安全和实现漏洞检测的重要技术手段,也是信息安全研究的热点领域。对近年来污点分析技术的研究现状和发展情况进行综述,介绍了污点分析的理论基础以及静态污点分析和动态污点分析的基本概念、关键技术和研究进展,并从技术实现方式的角度出发,阐述了基于硬件、软件、虚拟环境和代码等四种污点分析技术的实现方式、核心思想以及优缺点;然后,从污点数据流向的角度出发,概述了污点分析技术在相关领域的两种典型应用,即隐私数据泄露检测和漏洞探测;最后,简要分析了污点分析的缺点和不足,并展望该技术的研究前景和发展趋势。 Taint analysis technology is an important method to protect private data security and realize vulnerability detection,and it is also a hot area of information security research.The research status and development of taint analysis technology in recent years were summarized.The theoretical basis of taint analysis,the basic concepts,key technologies and research progress of static taint analysis and dynamic taint analysis were introduced.From the perspective of the implementation,the implementation methods,core ideas,advantages and disadvantages of four taint analysis technologies based on hardware,software,virtual environment and code were expounded;from the perspective of the flow of taint data,two typical applications in related fields,privacy data leakage detection and vulnerability detection,were outlined.Finally,the shortcomings of taint analysis were briefly analyzed,and the research prospects and development trends of the technology were predicted.
作者 任玉柱 张有为 艾成炜 REN Yuzhu;ZHANG Youwei;AI Chengwei(School of Cyber Security,Information Engineering University,Zhengzhou Henan 450001,China;State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou Henan 450001,China;Advanced Technology Research Institute of Zhengzhou Xinda,Zhengzhou Henan 450001,China)
出处 《计算机应用》 CSCD 北大核心 2019年第8期2302-2309,共8页 journal of Computer Applications
关键词 信息流分析 静态污点分析 动态污点分析 隐私数据 漏洞挖掘 information flow analysis static taint analysis dynamic taint analysis privacy data vulnerability discovery
  • 相关文献

参考文献12

二级参考文献134

  • 1赵保华,陈波,陆超.概率信息流安全属性分析[J].计算机学报,2006,29(8):1447-1452. 被引量:6
  • 2Vcnkataramani G, Doudalis I, Solihin Y, Prvulovic M. FlexiTaint: A programmable accelerator for dynamic taint propagation. In: Carter J, ed. Proc. of the 14th Int'l Syrup. on High Performance Computer Architecture (HPCA). New York: ACM Press, 2008. 173-184. Idol: 10.1109/HPCA.2008.46S8637].
  • 3Newsome J, Song D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Harder E, ed. Prec. of the Network and Distributed System Security Syrup. (NDSS 2005). San Diego: National Security Agency Press, 2005. 187-204.
  • 4CVE terminology page. 2009. http://www.cve.mitre.org/about/terminology.html#vulnerability.
  • 5Sekar R. An efficient black-box technique for defeating Web application attacks. In: Vigna G, ed. Proc. of the Network and Distributed System Security Syrup. (NDSS 2009). San Diego: National Security Agency Press, 2009.23-39.
  • 6CVE and CCE statistics query page. 2009. http://web.nvd.nist.gov/view/vuln/statistics?execution=e 1 s 1.
  • 7Open Web Application Security Project (OWASP). The ten most critical Web application security vulnerabilities. 2007. http://www.owasp.org/images/e/e8/OWASP_ Top_ 10 _2007.pdf.
  • 8Lam MS, Martin MC, Livshits VB, Whaley J. Securing Web applications with static and dynamic information flow tracking. In: Hatcliff J, ed. Proc. of the 2008 ACM SIGPLAN Symp. on Partial Evaluation and Semantics-based Program Manipulation. New York: ACM Press, 2008.3-12. [doi: 10.1145/1328408.1328410].
  • 9Xie YC, Chou A, Engler D. ARCHER: Using symbolic, path-sensitive analysis to detect memory access errors. In: Paakki J, ed. Proc. of the 9th European Software Engineering Conf. Held Jointly with 1 lth ACM SIGSOFT Int'l Symp. on Foundations of Software Engineering. New York: ACM Press, 2003. 327-336. [doi: 10.1145/940071.940115].
  • 10Yin H, Song D, Egele M, Kruegel C, Kirda E. Panorama: Capturing system-wide information flow for malware detection and analysis. In: Ning P, ed. Proc. of the 14th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2004. 116-127. [doi: 10.1145/1315245.1315261].

共引文献133

同被引文献104

引证文献19

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部