一种基于随机游走的固件代码补丁修复判定方法
作者:
作者单位:

1.国防科技大学电子对抗学院,安徽合肥 230037 ;2.网络空间安全态势感知与评估安徽省重点实验室, 安徽合肥 230037 ;3.31455部队,辽宁沈阳 110000

作者简介:

沈毅,男,1985年生,副教授,研究方向为Web应用安全E-mail:shenyi@nudt.edu.cn

通讯作者:

中图分类号:

TP393

基金项目:

国家自然科学基金资助项目(62202484)


A method for determining firmware code patch repair based on random walk
Author:
Affiliation:

1.College of Electronic Engineering, National University of Defense Technology, Hefei 230007 , China ; 2.Anhui Province Key Laboratory of Cyberspace Security SituationAwareness and Evaluation, Hefei 230007 , China ; 3.Unit 31455 of PLA, Shenyang 110000 , China

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    确定目标程序中的漏洞是否被修复,是软件安全性检测的途径之一,能够提高程序安全性。提出了一种基于随机游走的固件补丁存在性判定方法,利用程序分析技术对二进制固件函数进行代码特征提取和分析,判断固件中的函数是否进行了补丁修复,实现对固件漏洞代码的检测。该方法分别对固件中的目标函数和对应的漏洞函数、固件中的目标函数和补丁函数构建表征代码相似性程度的伴随图,并使用随机游走的方法筛选伴随图中的重要节点。基于重要节点信息,可以判断目标函数与漏洞函数、补丁函数的相似程度,实现对目标函数补丁修复情况的自动化判断。实验证明,提出的方法可以实现对固件补丁修复情况的高效判断,为提高二进制固件安全性提供支持。

    Abstract:

    Determining whether vulnerabilities in the target program have been fixed is one of the approaches to software security detection, which can enhance the safety of the program. A method for determining the existence of firmware patches based on random walks was proposed. This method utilizes program analysis techniques to extract and analyze code features from binary firmware functions, judging whether functions in the firmware have undergone patch repairs, and achieving the detection of firmware vulnerability codes. The method constructs accompanying graphs representing the degree of code similarity between the target function in the firmware and its corresponding vulnerability function, as well as between the target function and the patch function. Important nodes in the accompanying graph are then selected using a random walk approach. Based on the information from these important nodes, it is possible to determine the similarity between the target function and both the vulnerability function and the patch function, enabling automated judgment on the patch repair status of the target function. Experimental results show that the proposed method can efficiently judge the patch repair status of firmware, providing support for enhancing the security of binary firmware.

    参考文献
    相似文献
    引证文献
引用本文
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2023-08-30
  • 最后修改日期:2023-11-10
  • 录用日期:
  • 在线发布日期: 2024-07-22
  • 出版日期:
文章二维码