taint analysis review

16
王王

Upload: beau-cherry

Post on 04-Jan-2016

112 views

Category:

Documents


7 download

DESCRIPTION

Taint Analysis Review. 王卓. Agenda. Overview People Tools. Overview. Taint analysis 主要原理 : 将来自于网络等不被信任的渠道的数据都会被标记为“被污染”的,由此产生的一系列算术和逻辑操作新生成的数据也会继承源数据的“是否被 污染”的属性。然后根据指令的操作数或者函数参数的污染状态查找软件漏洞。. 相关论文. Dawn Song. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Taint Analysis Review

王卓

Page 2: Taint Analysis Review

AgendaOverview

People

Tools

Page 3: Taint Analysis Review

OverviewTaint analysis

主要原理 :将来自于网络等不被信任的渠道的数据都会被标记为“被污染”的,由此产生的一系列算术和逻辑操作新生成的数据也会继承源数据的“是否被 污染”的属性。然后根据指令的操作数或者函数参数的污染状态查找软件漏洞。

Page 4: Taint Analysis Review

相关论文

Page 5: Taint Analysis Review

Dawn SongAssociate Professor

Computer Science Division University of California, Berkeley

Panorama: capturing system-wide information flow for malware detection and analysis

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software

Page 6: Taint Analysis Review

Omer Trippa PhD candidate at Tel-Aviv University

TAJ: Effective Taint Analysis of Web Applications PLDI 09

Learning Minimal Abstractions POPL2011

Page 7: Taint Analysis Review

James ClauseAn assistant professor at the University of Delaware.Research interests: software engineering with

emphasis on debugging and program analysisPenumbra: automatically identifying

failure-relevant inputs using dynamic tainting ISSTA09

Dytan ISSTA2007Effective memory protection using

dynamic tainting ASE07

Page 8: Taint Analysis Review

Tielei Wang北京大学计算机科学技术研究所

TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability DetectionIEEE S&P

IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution NDSS2009

Page 9: Taint Analysis Review

TaintcheckAuthor: James Newsome, Dawn SongDynamic Taint Analysis for Automatic

Detection, Analysis, and Signature Generation of Exploits on Commodity Software NDSS05

The first practical taint tool.Based on Valgrind.

Page 10: Taint Analysis Review

LIFTLIFT: A Low-Overhead Practical Information Flow

Tracking System for Detecting Security AttacksFeng Qin, Ohio State University Cheng Wang, Intel Corporation Zhenmin Li, University of Illinois at Urbana-

ChampaignA low-overhead attack discoverer.:1.Fast Path2.Merged Check3.Fast Switch

Page 11: Taint Analysis Review

DytanDytan: A Generic Dynamic Taint Analysis

Framework ISSTA 2007James Clause, Wanchun (Paul) Li, and Alessandro OrsoHighlight: Control flow Taint

Page 12: Taint Analysis Review

BuzzfuzzTaint-based Directed Whitebox

Fuzzing ICSE2009Vijay Ganesh and Tim Leek and Martin

Rinard MITUsing taint analysis to direct fuzzing.

Page 13: Taint Analysis Review
Page 14: Taint Analysis Review

TaintScopeTaintScope: A Checksum-Aware Directed

Fuzzing Tool for Automatic Software Vulnerability Detection

Tielei Wang, Tao Wei1, Guofei Gu, Wei ZouKey words: Fuzzing, Taint analysis, Symbolic

executionThe approach: (1) byte analysis (2) checksum information

Page 15: Taint Analysis Review
Page 16: Taint Analysis Review