计算机科学 ›› 2013, Vol. 40 ›› Issue (5): 184-188.

• 软件与数据库技术 • 上一篇    下一篇

一种基于污点数据传播和无干扰理论的软件行为可信性分析模型

陈曙,叶俊民,张帆   

  1. 华中师范大学计算机学院 武汉430079;华中师范大学计算机学院 武汉430079;杭州电子科技大学通信工程学院 杭州310018
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受中央高校自主科研基金(CCNU11A01012,CCNU11A02007),湖北省自然科学基金(2010CDB04001)资助

Taint Trace with Noninterference Based Approach for Software Trust Analysis

CHEN Shu,YE Jun-min and ZHANG Fan   

  • Online:2018-11-16 Published:2018-11-16

摘要: 以无干扰理论为基础,提出了一种基于污点数据流的软件行为可信分析模型。该模型通过跟踪程序外部输入的污点数据,提取可能引发系统不可信的关键系统调用,并建立污点传播调用序列。利用完整性条件下的污点信息流无干扰模型来判定构成污点传播的系统调用序列执行时是否可信,并给出了调用序列可信性判定定理。

关键词: 可信计算,污点分析,无干扰

Abstract: A model for software trust analysis was proposed based on taint data trace and noninterference theory.This approach extracts core operation system APIs that may cause un-trusted behaviors by tracing taint data imported from outside of software environment.These APIs forms a taint dependency behavior model and imports information flow model to analyse whether it is trusted.Theorem for the trust determinant is also improved.

Key words: Trusted computing,Taint analysis,Noninterference model

[1] Challener D,Catherman R.A practical Guide to Trusted Computing [M].北京:机械工业出版社,2009
[2] 沈昌祥,张焕国,王怀民,等.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-16
[3] Newsome J,Song D.Dynamic Taint Analysis for Automatic Detection,Analysis,and Signature Generation of Exploits on Commodity Software[C]∥Proceedings of the Network and Distributed Systems Security Symposium(NDSS).Feb 2005:56-73
[4] Kang M G,Camant S M,Poosankam P,et al.DTA++:Dynamic Taint Analysis with Targeted Control-Flow Propagation [C]∥Proceedings of the 18th Annual Network and Distributed System Security Symposium(NDSS).SanDiego,CA,2011:67-81
[5] Coogan K,Lu Gen,Debray S.Deobfuscation of VirtualizationObfuscated Software A Semantics-Based Approach [C]∥CCS 2011.Chicago,Illinois,USA,2011:17-21
[6] 王蕊,冯登国,杨轶,等.基于语义的恶意代码行为特征提取及检测方法[J].软件学报,2012,23(2):378-39
[7] Li Y,Zuo ZH.An overview of object code obfuscation technologies[J].Journal of Computer Technology and Development,2007,17(41):125-127
[8] Ushby J.Noninterference,Transitivity,and Channel-Control Se-curity Policies[R].Computer Science Laboratory,SRI International,2005
[9] Haigh J T,Yong W D.Extending the noninterference model of MLS for SAT [J].IEEE Transaction On Software Engineering,1987,2(13):141-150
[10] Goguen J A,Meseguer J.Security policies and security models [C]∥Proc.of the 1982IEEE Symposium on Security and Privacy.IEEE Computer Society Press,April 1982:11-20
[11] 赵佳,沈昌祥,刘吉强,等.基于无干扰理论的可信链模型[J].计算机研究与发展,2008,45(6):974-980
[12] 张帆,陈曙,桑永宣,等.完整性条件下无干扰模型[J].通信学报,2011,2(10):11-19
[13] Bellard F.QEMU documentation . http://wiki.qemu.org/Main_Page,2011

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!