首页> 外文学位 >Reverse engineering of data structures from binary.
【24h】

Reverse engineering of data structures from binary.

机译:二进制数据结构的逆向工程。

获取原文
获取原文并翻译 | 示例

摘要

Reversing engineering of data structures involves two aspects: (1) given an application binary, infers the data structure definitions; and (2) given a memory dump, infers the data structure instances. These two capabilities have a number of security and forensics applications that include vulnerability discovery, kernel rootkit detection, and memory forensics.;In this dissertation, we present an integrated framework for reverse engineering of data structures from binary. There are three key components in our framework: REWARDS, SigGraph and DIMSUM. REWARDS is a data structure definition reverse engineering component that can automatically uncover both the syntax and semantics of data structures. SigGraph and DIMSUM are two data structure instance reverse engineering components which can recognize the data structure instances in a memory dump. In particular, SigGraph can systematically generate non-isomorphic signatures for data structures in an OS kernel and enable the brute force scanning of kernel memory to find the data structure instances. SigGraph relies on memory mapping information, but DIMSUM, which leverages probabilistic inference techniques, can directly scan memory without memory mapping information.;We have developed a number of enabling techniques in our framework that include (1) bi-directional (i.e., backward and forward) data flow analysis, (2) signature graph generation and comparison, and (3) belief propagation based probabilistic inference. We demonstrate how we integrate these techniques into our reverse engineering framework in this dissertation.;We have obtained the following preliminary experimental results. REWARDS achieved high accuracy in revealing data structure definitions accessed during an execution. SigGraph recognized Linux kernel data structure instances with zero false negative and close-to-zero false positives, and had strong robustness in the presence of malicious pointer manipulations. DIMSUM achieved higher effectiveness than previous non-probabilistic approaches without memory mapping information.
机译:数据结构的逆向工程涉及两个方面:(1)给定一个应用程序二进制文件,推断数据结构定义; (2)给定内存转储,推断数据结构实例。这两种功能具有许多安全性和取证应用程序,包括漏洞发现,内核rootkit检测和内存取证。;本文提出了一种集成框架,用于对二进制数据结构进行逆向工程。我们的框架中包含三个关键组件:REWARDS,SigGraph和DIMSUM。 REWARDS是一个数据结构定义逆向工程组件,可以自动发现数据结构的语法和语义。 SigGraph和DIMSUM是两个数据结构实例反向工程组件,可以识别内存转储中的数据结构实例。尤其是,SigGraph可以系统地为OS内核中的数据结构生成非同构签名,并使暴力扫描内核内存以找到数据结构实例。 SigGraph依赖于内存映射信息,但是利用概率推理技术的DIMSUM可以直接扫描内存而无需内存映射信息。;我们在我们的框架中开发了许多启用技术,其中包括(1)双向(即,反向和反向)。向前)的数据流分析,(2)签名图的生成和比较,以及(3)基于信念传播的概率推理。本文证明了如何将这些技术集成到逆向工程框架中。我们已经获得了以下初步实验结果。奖励在揭示执行期间访问的数据结构定义方面具有很高的准确性。 SigGraph识别出具有零误报和接近零误报的Linux内核数据结构实例,并且在存在恶意指针操纵的情况下具有强大的鲁棒性。与没有内存映射信息的以前的非概率方法相比,DIMSUM的有效性更高。

著录项

  • 作者

    Lin, Zhiqiang.;

  • 作者单位

    Purdue University.;

  • 授予单位 Purdue University.;
  • 学科 Engineering Computer.;Computer Science.
  • 学位 Ph.D.
  • 年度 2011
  • 页码 162 p.
  • 总页数 162
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号