首页> 外文会议>Information and communications security >Architecture- and OS-Independent Binary-Level Dynamic Test Generation
【24h】

Architecture- and OS-Independent Binary-Level Dynamic Test Generation

机译:与体系结构和操作系统无关的二进制级动态测试生成

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Dynamic test generation approach consists of executing a program while gathering symbolic constraints on inputs from predicates encountered in branch statements, and of using a constraint solver to infer new program inputs from previous constraints in order to steer next executions towards new program paths. Variants of this technique have recently been adopted in finding security vulnerabilities in binary level software. However, such existing approaches and tools are not retar-getable: on the one hand, they can only find vulnerabilities in the binaries for a specific ISA; on the other hand, they can only find vulnerabilities over a specific OS because the execution trace is totally OS-dependently recorded in these tools. This paper presents a new dynamic test generation technique and a tool, ReTBLDTG, short for ReTargetable Binary-Level Dynamic Test Generation, that implements this technique. Unlike other such techniques, ReTBLDTG can deal with binaries for any ISAs over any OSes. ReTBLDTG is based on the whole system virtual machine that provides OS-independent and fast concrete execution of the target program. And which thread the executing instruction belongs to is OS-independently identified by analyzing the registers' value and hardware events over the virtual machine. Thus, the execution trace is recorded, without knowing the internal structure of the guest OS. At the same time, ReTBLDTG defines a Meta Instruction Set Architecture (MetaISA); ReTBLDTG maps the execution information, which is collected during the binary source code execution, to MetalSA; and symbolic execution, constraint collection and constraint solver operates on MetalSA, thus making these tasks ISA-independent. We have implemented our ReTBLDTG, retargeted it to 32-bit x86, PowerPC and Sparc ISAs, and used it to automatically find the six known bugs in the six benchmarks over Linux and Windows. Our results indicate that our ReTBLDTG can be easily retargeted to any ISA with only a few overheads; and ReTBLDTG can effectively find bugs located deep within large applications over any OS.
机译:动态测试生成方法包括执行程序,同时从分支语句中遇到的谓词收集输入的符号约束,并使用约束求解器从先前的约束中推断出新的程序输入,以便将下一个执行转向新的程序路径。最近已采用此技术的变体在二进制级别的软件中查找安全漏洞。但是,这样的现有方法和工具是无法解决的:一方面,它们只能在特定ISA的二进制文件中找到漏洞;另一方面,它们只能在二进制文件中找到特定ISA的漏洞。另一方面,他们只能找到特定OS上的漏洞,因为执行跟踪完全依赖于OS记录在这些工具中。本文介绍了一种新的动态测试生成技术和一种工具ReTBLDTG,该工具是可重定位二进制级动态测试生成的缩写,该工具实现了该技术。与其他此类技术不同,ReTBLDTG可以处理任何OS上任何ISA的二进制文件。 ReTBLDTG基于整个系统虚拟机,该虚拟机提供了与操作系统无关的目标程序的快速具体执行。通过分析虚拟机上的寄存器值和硬件事件,可以独立于操作系统确定执行指令所属的线程。因此,在不了解来宾OS的内部结构的情况下记录了执行跟踪。同时,ReTBLDTG定义了元指令集架构(MetaISA); ReTBLDTG将在二进制源代码执行期间收集的执行信息映射到MetalSA;符号执行,约束收集和约束求解器在MetalSA上运行,因此使这些任务与ISA无关。我们已经实现了ReTBLDTG,将其重新定位到32位x86,PowerPC和Sparc ISA,并使用它来通过Linux和Windows自动找到六个基准测试中的六个已知错误。我们的结果表明,只需很少的开销,我们的ReTBLDTG就可以轻松地重新定位到任何ISA。 ReTBLDTG可以有效地发现任何操作系统上大型应用程序内部的错误。

著录项

  • 来源
  • 会议地点 Beijing(CN);Beijing(CN)
  • 作者单位

    School of Computer, National University of Defence Technology, ChangSha, China;

    rnSchool of Computer, National University of Defence Technology, ChangSha, China;

    rnSchool of Computer, National University of Defence Technology, ChangSha, China;

    rnSchool of Computer, National University of Defence Technology, ChangSha, China;

    rnSchool of Computer, National University of Defence Technology, ChangSha, China;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 通信保密与通信安全;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号