標題: 操作利用非典型之擬真執行
Exploiting Atypical Symbolic Executions
作者: 邱世欣
Chiu, Shih-Hsin
黃世昆
Huang, Shih-Kun
資訊科學與工程研究所
關鍵字: 擬真執行;緩衝區溢位;symbolic execution;buffer overflow
公開日期: 2010
摘要: 軟體安全日漸成為重要的研究主題,起因於越來越多的軟體攻擊行為發生,這些狀況有一部份是源自於程式語言本身的缺陷,而另一方面也是程式設計師本身的粗心所導致。因此,我們將藉由軟體偵測技術以減少這些問題。在論文中探討目前被廣泛運用的的程式漏洞-緩衝區溢位(Buffer overflow),例如西元2003年八月造成重大損失的疾風(Blaster)病毒即利用此種漏洞進行破壞。為了防止此類型的漏洞,本論文使用KLEE的符號執行模組(symbolic execution model)並引入新的記憶體對映機制(memory map)來探測緩衝區溢位。相較於傳統的檢測工具,本論文所提出的工具可確實產生、可利用的測資來觸發漏洞的行為,進而證實漏洞的存在。這些測資事實上就是一組攻擊字串,有別於駭客手動方式產生,我們將提出自動產生的方法。
Software security is getting more important recently. There are more and more attacks than before. It is partially due to some design flaws of the programming language and the lack of secure programming practices by programmers. The most serious vulnerability this thesis concerns with is buffer overflow, present in many C/C++ programs, such as the Blaster worm. For preventing from such vulnerabilities, we use symbolic execution with a new memory model supported by KLEE to detect buffer overflow vulnerabilities. This thesis actually generates an exploitable input to trigger buffer overflow and verify the presence of the vulnerability. The input suites we generate are realistic attacks. Unlike the usual hacking methods with manual techniques to reason on the tainting paths, we propose methods to generate exploitable input automatically.
URI: http://140.113.39.130/cdrfb3/record/nctu/#GT079755589
http://hdl.handle.net/11536/45934
Appears in Collections:Thesis


Files in This Item:

  1. 558901.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.