首页> 外国专利> METHOD AND APPARATUS FOR IDENTIFYING SECURITY VULNERABILITY IN BINARY AND LOCATION OF CAUSE OF SECURITY VULNERABILITY

METHOD AND APPARATUS FOR IDENTIFYING SECURITY VULNERABILITY IN BINARY AND LOCATION OF CAUSE OF SECURITY VULNERABILITY

机译:识别二进制中的安全漏洞的方法和装置以及引起安全漏洞的原因的位置

摘要

Provided are a binary vulnerability analysis method performed by a computing device is provided, and the binary vulnerability analysis method includes a primary execution step of recording a symbolic constraint of a vulnerability associated with an execution flow path causing a crash to a target binary to be analyzed and a suspicious element on the execution flow path by performing taint analysis through a primary execution of the target binary; and a secondary execution step of performing a secondary execution, which is a symbolic execution, on the execution flow path and, if an instruction satisfying the symbolic constraint is found, determining that the vulnerability exists in the target binary by comparing the suspicious element and the found instruction.
机译:提供了一种由计算设备执行的二进制漏洞分析方法,并且该二进制漏洞分析方法包括主要执行步骤,该主要执行步骤记录与导致要分析的目标二进制文件崩溃的执行流路径相关联的漏洞的符号约束。通过对目标二进制文件的初次执行进行污点分析,从而在执行流程路径上形成可疑元素;以及在执行流程路径上执行二次执行的二次执行步骤,该二次执行是符号执行,并且如果发现满足符号约束的指令,则通过将可疑元素与可疑元素进行比较来确定目标二进制文件中存在漏洞。找到指令。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号