期刊文献+

基于消息语义解析的软件网络行为分析 被引量:4

Software network behavior analysis based on message semantics analysis
在线阅读 下载PDF
导出
摘要 通过对软件网络行为的研究,提出了通过结合动态分析软件行为技术和网络消息语义解析技术对软件网络行为进行分析的系统模型。系统主要由动态二进制分析模块、消息语义解析模块和网络行为分析模块组成。通过动态二进制分析,利用行为监控和劫持机制,获取软件对于应用程序编程接口(API)函数和系统函数的调用情况;通过动态污点分析,对消息语义进行解析。实验验证表明,软件行为和消息语义解析的结合可以用于分析软件网络行为。 Through studying software network behavior,a new system model for analyzing the software network behavior based on dynamic binary analysis and message semantics analysis was proposed.The system consisted of dynamic binary analysis module,message semantics analysis module and network behavior analyzer.With the dynamic binary analysis,the Application Programming Interface(API) functions and system functions called by software could be obtained;by using the dynamic taint analysis,the message semantics could be extracted.The experimental results show that,combining the dynamic binary analysis and message semantics extraction can be used for analyzing the software network behavior.
出处 《计算机应用》 CSCD 北大核心 2012年第1期25-29,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61003303) 国家863计划项目(2009AA01A346)
关键词 动态二进制分析 动态污点分析 消息语义解析 应用程序编程接口 dynamic binary analysis dynamic taint analysis message semantics analysis Application Programming Interface(API)
  • 相关文献

参考文献11

  • 1BETHENCOURT J, SONG D, WATERS B. Analysis-resistant mal-ware [ C] // Proceedings of the 15th IEEE Network and Distributed System Security Symposium. San Diego: The Intemet Society Press, 2008:10 - 13.
  • 2曾祖训.中国白酒的魅力[J].酿酒,2002,29(6):99-99. 被引量:4
  • 3BAYER U, KRUEGEL C, KIRDA E. TTAnalyze: A tool for analyzing malware [EB/OL]. [2011-03-25]. http://www. iseclab. org/ projects/ttanalyze/.
  • 4Cheng ML,Wu J,Wang HQ,Xue LM,Tan YZ,Liu P,Li CX,Huang NH,Yao YM,Ren LZ,Ye L,Li L, Jia ML. Effet of Maotai liguor in inducing metallothioneins and on hepatic stellate cells[J].Shijie Huaren Xiaohua Zazhi,2001,9(12):1369-1373.
  • 5庄名扬.中华浴酒的保健源——功能因子的剖析[J].酿酒,2003,30(4):11-14. 被引量:6
  • 6高月明,侯小波,沈淑梅.清香型白酒潜力何在[J].酿酒,2002,29(6):6-8. 被引量:13
  • 7尚维,刘群,栗伟.核酸保健功能白酒的研究[J].酿酒,2001,28(4):92-93. 被引量:6
  • 8WANG T, WEI T, GU G. TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection [C]// Proceedings of 2010 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2010:497-512.
  • 9LIN Z, JIANG X, XU D. Automatic protocol format reverse engineering through context-aware monitored execution [ C]// Proceedings of 2008 Network and Distributed System Security Symposium. San Diego: The Internet Society Press, 2008:1 - 15.
  • 10COMPARETTI P M, WONDRACEK G, KRUEGEL C. Prospex: Protocol specification extraction [C]// Proceedings of 2009 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2009:110 - 125.

二级参考文献6

共引文献21

同被引文献37

  • 1温研,王怀民,胡华平.分布式网络行为监控系统的研究与实现[J].计算机工程与科学,2005,27(10):13-16. 被引量:10
  • 2王林,张婧婧.复杂网络的中心化[J].复杂系统与复杂性科学,2006,3(1):13-20. 被引量:61
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:363
  • 4张甲,段海新,葛连升.基于事件序列的蠕虫网络行为分析算法[J].山东大学学报(理学版),2007,42(9):36-40. 被引量:5
  • 5Trusted Network Connect TNC Architecture for Interoperability Specification Versionl.4[EB/OL]. http: / / www.trustedcomputinggroup.org/ resources/ tcg_ architecture overview version_l 4,2009,5.
  • 6李焕洲,胡勇,张健,林宏刚,陈麟.基于终端资源的内网监控系统研究与实现[J].四川大学学报(工程科学版),2007,39(4):118-123. 被引量:2
  • 7ONE A. Smashing the stack for profit and fun [ J ]. Phrack Maga- zine,1996,49(7) :1-32.
  • 8AVIJIT K, GUPTA P, GUPTA D. Libsafeplus:tools for runtime buffer overflow protection[ C]//Proc of the 13th USENIX Security Sympo- sium. Berkeley : USENIX ,2004:4-20.
  • 9WANG Hua, GUO Yao, CHEN Xiang-qun. FPValidator: validating type equivalence of function pointers on the fly [ C ]//Proc of Annual Computer Security Applications Conference. Piscataway:IEEE Press, 2009 : 51-59.
  • 10COWAN, PU C, DAIER D, et al. StackGuard : automatic adaptive de- tection and prevention of buffer-overflow attacks [ C ]//Proc of the 7th USENIX Security Symposium. Berkeley : USENIX, 1998:63-78.

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部