首页> 外文期刊>Computers & Security >A practical off-line taint analysis framework and its application in reverse engineering of file format
【24h】

A practical off-line taint analysis framework and its application in reverse engineering of file format

机译:实用的离线污点分析框架及其在文件格式逆向工程中的应用

获取原文
获取原文并翻译 | 示例

摘要

This paper presents FlowWalker, a novel dynamic taint analysis framework that aims to extract the complete taint data flow while eliminating the bottlenecks that occur in existing tools, with applications to file-format reverse engineering. The framework proposes a multi-taint-tag assembly-level taint propagation strategy. FlowWalker separates taint tracking operations from execution with an off-line structure, utilizes memory-mapped files to enhance I/O efficiency, processes taint paths during virtual execution playback, and uses parallelization and pipelining mechanisms to achieve speedup. Based on the semantic correlations implied by the taint path information, this paper presents an algorithm for extracting the structures of unknown file formats. According to test data, the overall program runtime ranges from 92.98% to 208.01% of the length of the underlying instrumentation alone, while the speed enhancement is 60% compared to another well-featured tool in Windows. Medium-complexity file formats are correctly partitioned, and the constant fields are extracted. Due to its efficiency and scalability, FlowWalker can address the needs of further security-related research.
机译:本文介绍了FlowWalker,这是一种新颖的动态污染分析框架,旨在提取完整的污染数据流,同时消除现有工具中出现的瓶颈,并将其应用于文件格式逆向工程。该框架提出了一种多污染标签组件级的污染传播策略。 FlowWalker通过离线结构将污点跟踪操作与执行分离开来,利用内存映射文件提高I / O效率,在虚拟执行回放过程中处理污点路径,并使用并行化和流水线化机制来实现加速。基于污点路径信息所隐含的语义相关性,提出一种提取未知文件格式结构的算法。根据测试数据,整个程序运行时间仅占基础工具长度的92.98%至208.01%,而与Windows中另一个功能完善的工具相比,速度提高了60%。中等复杂性的文件格式已正确分区,并且提取了常量字段。由于其效率和可扩展性,FlowWalker可以满足与安全性相关的进一步研究的需求。

著录项

  • 来源
    《Computers & Security》 |2015年第6期|1-15|共15页
  • 作者单位

    Beijing University of Posts and Telecommunications, Beijing, China,National Engineering Laboratory for Mobile Network Security, Beijing, China,No.10 Xitucheng Road, Haidian District, Beijing, China;

    Beijing University of Posts and Telecommunications, Beijing, China,National Engineering Laboratory for Mobile Network Security, Beijing, China;

    China Information Technology Security Evaluation Center, Beijing, China;

    China Information Technology Security Evaluation Center, Beijing, China;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Taint analysis; Data flow tracking; Binary instrumentation; Format reverse engineering; Fuzzing test; Virtualized execution; Parallelization;

    机译:污染分析;数据流跟踪;二进制仪器;格式逆向工程;模糊测试虚拟执行;并行化;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号