바이너리 기반 자동 취약점 분석 도구 구현 및 성능개선
- Alternative Title
- Implementation and Performance Improvement of Binary-based Automatic Vulnerability Analysis Tool
- Abstract
- An automatic vulnerability analysis tool enables efficient analysis of binary code to automatically detect various types of security vulnerabilities. The dynamic binary analysis techniques used to implement these tools are more accurate than the static binary analysis techniques, but they are very resource intensive to execute and cause severe performance degradation. In particular, this performance degradation is due to the fact that all instructions affected by the input value must be traced during the analysis. In this paper, we present an automatic vulnerability analysis tool that alleviates previously introduced problems. The proposed tool implements two optimization techniques. First, it removes unnecessary operation by first identifying repeatedly executed instructions as blocks and safely removing them from analysis. Second, it implements Concolic Execution method in which only traced objects are set as symbols and included to the analysis. The proposed binary-based Concolic Execution, we claim, has another significance in providing user-friendly environment in that existing tools mandate users to understand and analyze binary code in order to efficiently use the analysis tools.
- Author(s)
- 박종섭
- Issued Date
- 2019
- Awarded Date
- 2019. 2
- Type
- Dissertation
- Keyword
- 자동 취약점 분석 동적 오염 분석 콘콜릭 익스큐선
- Publisher
- 부경대학교
- URI
- https://repository.pknu.ac.kr:8443/handle/2021.oak/23267
http://pknu.dcollection.net/common/orgView/200000180243
- Affiliation
- 부경대학교 대학원
- Department
- 대학원 정보보호학협동과정
- Advisor
- 이경현
- Table Of Contents
- I. 서 론 1
1. 연구배경 1
2. 연구 내용 및 구성 4
Ⅱ. 관련 연구 6
1. 퍼징(Fuzzing) 6
2. DBI(Dynamic Binary Instrumentation) 7
3. 동적 오염 분석 7
4. 오염 분석 최적화 8
5. Concolic Execution 8
Ⅲ. 자동 취약점 분석 도구 최적화 10
1. 반복적으로 실행되는 코드를 블록 처리 및 최적화 11
가. 오염블록 범위 설정 13
나. 코드 최적화된 오염블록 생성 14
다. 오염객체 전파과정(Propagation) 분석 15
라. 캐시 활용 15
2. 사용자 입력 값에 영향을 받는 명령어만 Concolic Execution 수행 16
가. 명시적 오염 분석(Explicit Taint Analysis) 17
나. Concolic Execution 구성 요소 21
다. 바이너리 기반 Concolic Execution 구현 23
Ⅳ. 실 험 25
1. 실험 환경 25
2. 오염블록 구현 및 실험 결과 25
3. Concolic Execution 구현 및 실험 결과 33
Ⅴ. 결 론 34
참고 문헌 35
- Degree
- Master
-
Appears in Collections:
- 대학원 > 정보보호학협동과정
- Authorize & License
-
- Files in This Item:
-
Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.