Software Backdoor Analysis Based on Sensitive Flow Tracking and Concolic Execution

来源 :Wuhan University Journal of Natural Sciences | 被引量 : 0次 | 上传用户:lwfpa1
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to effectively discover backdoor behaviors, such as stealing secret information and injecting evil data into system, with less false negatives. With concolic execution on predetermined path, the backdoor trigger condition can be extracted and analyzed to achieve high accuracy. BASEC has been implemented and experimented on several software backdoor samples widespread on the Internet, and over 90% of them can be detected. Compared with behavior-based and system-call-based detection methods, BASEC relies less on the historical sample collections, and is more effective in detecting software backdoors, especially those injected into software by modifying and recompiling source codes. In order to effectively detect and analyze the back doors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution (BASEC) .BASEC uses sensitive flow tracking to effectively discover backdoor behaviors, such as stealing secret information and injecting evil data into system, with less false negatives. With concolic execution on predetermined path, the backdoor trigger condition can be extracted and analyzed to achieve high accuracy. BASEC has been implemented and experimented on several software backdoor samples widespread on the Internet, and over 90% of them Compared with behavior-based and system-call-based detection methods, BASEC relies less on the historical sample collections, and is more effective in detecting software backdoors, especially those injected into software by modifying and recompiling source codes.
其他文献
当前我国便利店业进入快速发展期,对此从宏观方面分析其发展现状、地域分布及行业前景,并结合7-11、罗森、7TT等运作实证,从微观层面开展竞争策略分析很有必要。当前我国便利
我今年60岁.在津南区教育教学研究室任教研员.rn从幼年起,我就热爱文艺、体育和书法.在天津一中上初中时,曾与相声表演艺术家常贵田先生是同班,我二人当年还搭档演出过相声呢
金融机构的“趋利本性”与80后、90后的“缺乏时间、线上生活”、“有梦想、追求个性化”特性相碰撞,能撞出什么火花?G20杭州峰会发布《G20数字普惠金融高级原则》公告之所以
介绍U型钢可缩支架连接件单槽板卡缆、双糟板卡缆使用受力状况及由腰定位改为耳定位,并研制出铸造耳卡和焊按耳卡连接料,使老的型钢又有了新的生命力。 Introduce the U-shaped
8月16日,长江流域产权交易共同市场第四届会员大会在贵州遵义召开。来自长江流域南北15个省及15个省会城市、30个地级市的60多位共同市场成员出席了会议。会议通过了《长江流
本文叙述了捷克和斯洛伐克共和国铀矿勘探和生产的发展历史,包括各个阶段内铀矿勘探的规模,所采用的技术方法,发现的主要矿床及其地质类型、铀矿山的生产状况及产量等。文章
期刊
期刊
Software defined networking(SDN)has emerged as an efficient network technology for lowering operating cost through simplified hardware,software and management.S
期刊
The unbanlanced updating frequency of data reduces the endurance of the whole non-volatile main memory that affects the system’s stability significantly. Wear-
期刊