基于补丁特性的漏洞扫描研究
信息技术与网络安全
刘思琦,王一鸣
(北京交通大学 计算机与信息技术学院,北京100044)
摘要: 为抵御漏洞引发的黑客攻击和漏洞自身产生的威胁,1day漏洞应用修复的通用办法是使用代码匹配检测。但目前源代码匹配误报率高,二进制代码匹配不精确且不通用。基于此,提出了一种由源代码到二进制的基于补丁特性的漏洞扫描模型——BinScan。它先形成已知漏洞数据库并对源代码进行已知漏洞扫描得出漏洞检测结果;然后利用源代码检测信息对打补丁前后源代码编译生成二进制文件,形成二进制漏洞库;最后比较目标二进制文件相似性,利用源代码结果进行检验。最终生成Linux Kernel的2 700条漏洞数据,15 496个patch文件,实现了利用源代码检测限制二进制文件的漏洞检测范围,然后基于CFG和二进制代码相似性检测补丁存在以检测漏洞。检测结果表明,此方法与其他二进制漏洞检测工具相比,可以将源代码级的漏洞扫描能力应用于二进制,是有效的。
中圖分類號: TP309
文獻標識碼: A
DOI: 10.19358/j.issn.2096-5133.2021.07.009
引用格式: 劉思琦,王一鳴. 基于補丁特性的漏洞掃描研究[J].信息技術與網(wǎng)絡安全,2021,40(7):52-58.
文獻標識碼: A
DOI: 10.19358/j.issn.2096-5133.2021.07.009
引用格式: 劉思琦,王一鳴. 基于補丁特性的漏洞掃描研究[J].信息技術與網(wǎng)絡安全,2021,40(7):52-58.
Research on vulnerability scanning based on patch characteristics
Liu Siqi,Wang Yiming
(School of Computer and Information Technology,Beijing Jiaotong University,Beijing 100044,China)
Abstract: In order to resist the hacker attack caused by the vulnerability and the threat generated by the vulnerability itself, the general method of 1day vulnerability application repair is to use code matching to detect. But at present, the false alarm rate of source code matching is high, and the binary code similarity matching is not accurate and universal. Based on this, this paper proposes a vulnerability scanning model from source code to binary code, BinScan, which is based on patch features. Firstly, it forms a known vulnerability database and scans the source code for known vulnerabilities to obtain the vulnerability detection results; then it uses the source code detection information to compile the source code before and after the patch to generate a binary file and to form a binary vulnerability library; finally it compares the target binary files for similarity performance, using the source code results for verification. In the end, this paper generates 2 700 vulnerability data and 15 496 patch files of Linux Kernel. It has been realized to use source code detection to limit the vulnerability detection range of binary files, and to detect the existence of patches based on the similarity of CFG and binary code to detect vulnerabilities. The detection results show that compared with other binary vulnerability detection tools, this method can apply source code level vulnerability scanning capabilities to binary and is effective.
Key words : patch characteristics;vulnerability scanning;binary;source code;security
0 引言
在時間維度上,漏洞都會經(jīng)歷產(chǎn)生、發(fā)現(xiàn)、公開和消亡等過程,不同的時間段,漏洞有不同的名稱和表現(xiàn)形式。1day漏洞是指在廠商發(fā)布安全補丁之后,大部分用戶還未打補丁的漏洞,此類漏洞依然具有可利用性。在各類型軟件中,許多漏洞的壽命超過12個月,針對此類漏洞的通用應用修復辦法是使用代碼匹配[1],但是往往通過補丁做出的修補都是一些細微的變化,這會導致許多代碼匹配的方法不精確且不通用,造成結果高誤報。
本文詳細內(nèi)容請下載:http://ihrv.cn/resource/share/2000003678
作者信息:
劉思琦,王一鳴
(北京交通大學 計算機與信息技術學院,北京100044)
此內(nèi)容為AET網(wǎng)站原創(chuàng),未經(jīng)授權禁止轉(zhuǎn)載。
