Computer Science ›› 2013, Vol. 40 ›› Issue (5): 184-188.

Previous Articles     Next Articles

Taint Trace with Noninterference Based Approach for Software Trust Analysis

CHEN Shu,YE Jun-min and ZHANG Fan   

  • Online:2018-11-16 Published:2018-11-16

Abstract: A model for software trust analysis was proposed based on taint data trace and noninterference theory.This approach extracts core operation system APIs that may cause un-trusted behaviors by tracing taint data imported from outside of software environment.These APIs forms a taint dependency behavior model and imports information flow model to analyse whether it is trusted.Theorem for the trust determinant is also improved.

Key words: Trusted computing,Taint analysis,Noninterference model

[1] Challener D,Catherman R.A practical Guide to Trusted Computing [M].北京:机械工业出版社,2009
[2] 沈昌祥,张焕国,王怀民,等.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-16
[3] Newsome J,Song D.Dynamic Taint Analysis for Automatic Detection,Analysis,and Signature Generation of Exploits on Commodity Software[C]∥Proceedings of the Network and Distributed Systems Security Symposium(NDSS).Feb 2005:56-73
[4] Kang M G,Camant S M,Poosankam P,et al.DTA++:Dynamic Taint Analysis with Targeted Control-Flow Propagation [C]∥Proceedings of the 18th Annual Network and Distributed System Security Symposium(NDSS).SanDiego,CA,2011:67-81
[5] Coogan K,Lu Gen,Debray S.Deobfuscation of VirtualizationObfuscated Software A Semantics-Based Approach [C]∥CCS 2011.Chicago,Illinois,USA,2011:17-21
[6] 王蕊,冯登国,杨轶,等.基于语义的恶意代码行为特征提取及检测方法[J].软件学报,2012,23(2):378-39
[7] Li Y,Zuo ZH.An overview of object code obfuscation technologies[J].Journal of Computer Technology and Development,2007,17(41):125-127
[8] Ushby J.Noninterference,Transitivity,and Channel-Control Se-curity Policies[R].Computer Science Laboratory,SRI International,2005
[9] Haigh J T,Yong W D.Extending the noninterference model of MLS for SAT [J].IEEE Transaction On Software Engineering,1987,2(13):141-150
[10] Goguen J A,Meseguer J.Security policies and security models [C]∥Proc.of the 1982IEEE Symposium on Security and Privacy.IEEE Computer Society Press,April 1982:11-20
[11] 赵佳,沈昌祥,刘吉强,等.基于无干扰理论的可信链模型[J].计算机研究与发展,2008,45(6):974-980
[12] 张帆,陈曙,桑永宣,等.完整性条件下无干扰模型[J].通信学报,2011,2(10):11-19
[13] Bellard F.QEMU documentation . http://wiki.qemu.org/Main_Page,2011

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!