首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于漏洞知识库的8031单片机系统软件漏洞检测算法
引用本文:单纯,荆高鹏,胡昌振,薛静锋,贺津朝.基于漏洞知识库的8031单片机系统软件漏洞检测算法[J].北京理工大学学报,2017,37(4):371-375.
作者姓名:单纯  荆高鹏  胡昌振  薛静锋  贺津朝
作者单位:北京理工大学软件学院,软件安全工程技术北京市重点实验室,北京 100081;北京理工大学软件学院,软件安全工程技术北京市重点实验室,北京 100081;北京理工大学软件学院,软件安全工程技术北京市重点实验室,北京 100081;北京理工大学软件学院,软件安全工程技术北京市重点实验室,北京 100081;北京理工大学软件学院,软件安全工程技术北京市重点实验室,北京 100081
基金项目:国家重点研发计划资助项目(2016YFB0800700)
摘    要:针对基于8031单片机系统软件的安全问题,对各权威漏洞数据库进行了分析研究,采用一种基于ECV规则的攻击分析方法从攻击事件中提取漏洞知识,根据漏洞种类及特征将漏洞从代码安全的角度分类,设计了三层结构的漏洞知识库,并根据漏洞知识库的设计提出了一种基于知识的漏洞检测算法,用于检测8031单片机系统漏洞。基于上述方法设计并实现了软件安全性逆向分析系统,对8031单片机系统进行漏洞检测。实验结果表明,基于该漏洞知识库的漏洞检测算法可以对目标程序正确进行漏洞检测,有利于降低软件代码漏洞量,并在一定程度上降低成本和资源消耗。 

关 键 词:漏洞知识库  8031单片机  漏洞检测  软件安全
收稿时间:2016/10/9 0:00:00

8031 Microcontroller Software Vulnerability Detection Algorithm Based on Vulnerability Knowledge Database
SHAN Chun,JING Gao-peng,HU Chang-zhen,XUE Jing-feng and HE Jin-zhao.8031 Microcontroller Software Vulnerability Detection Algorithm Based on Vulnerability Knowledge Database[J].Journal of Beijing Institute of Technology(Natural Science Edition),2017,37(4):371-375.
Authors:SHAN Chun  JING Gao-peng  HU Chang-zhen  XUE Jing-feng and HE Jin-zhao
Institution:Beijing Key Laboratory of Software Security Engineering Technology, School of Software, Beijing Institute of Technology, Beijing 100081, China
Abstract:The 8031 microcontroller software are currently used widely and its security issue become increasingly prominent. In view of this, the authoritative vulnerability databases were studied, extracted knowledge from attacks through a rule of ECV, classified security vulnerabilities according to the type and characteristics based code security, designed three-tier structure vulnerability knowledge database, and proposed a knowledge-based vulnerability detection algorithm based on the vulnerability knowledge library to detect the vulnerability of 8031 microcontroller. Designed and implemented a software security reverse-analysis system for 8031 binary program, and the effectiveness and availability of the vulnerability knowledge database and the rule of ECV were verified. The experimental result shows that the algorithm can correctly detect the target program vulnerability, having great significant in reducing the number of software vulnerabilities and saving lots of cost in detecting software vulnerability.
Keywords:vulnerability knowledge database  8031 microcontroller  vulnerability detection  software security
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《北京理工大学学报》浏览原始摘要信息
点击此处可从《北京理工大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号