PUKYONG

바이너리 기반 자동 취약점 분석 도구 구현 및 성능개선

Metadata Downloads
Alternative Title
Implementation and Performance Improvement of Binary-based Automatic Vulnerability Analysis Tool
Abstract
An automatic vulnerability analysis tool enables efficient analysis of binary code to automatically detect various types of security vulnerabilities. The dynamic binary analysis techniques used to implement these tools are more accurate than the static binary analysis techniques, but they are very resource intensive to execute and cause severe performance degradation. In particular, this performance degradation is due to the fact that all instructions affected by the input value must be traced during the analysis. In this paper, we present an automatic vulnerability analysis tool that alleviates previously introduced problems. The proposed tool implements two optimization techniques. First, it removes unnecessary operation by first identifying repeatedly executed instructions as blocks and safely removing them from analysis. Second, it implements Concolic Execution method in which only traced objects are set as symbols and included to the analysis. The proposed binary-based Concolic Execution, we claim, has another significance in providing user-friendly environment in that existing tools mandate users to understand and analyze binary code in order to efficiently use the analysis tools.
Author(s)
박종섭
Issued Date
2019
Awarded Date
2019. 2
Type
Dissertation
Keyword
자동 취약점 분석 동적 오염 분석 콘콜릭 익스큐선
Publisher
부경대학교
URI
https://repository.pknu.ac.kr:8443/handle/2021.oak/23267
http://pknu.dcollection.net/common/orgView/200000180243
Affiliation
부경대학교 대학원
Department
대학원 정보보호학협동과정
Advisor
이경현
Table Of Contents
I. 서 론 1
1. 연구배경 1
2. 연구 내용 및 구성 4
Ⅱ. 관련 연구 6
1. 퍼징(Fuzzing) 6
2. DBI(Dynamic Binary Instrumentation) 7
3. 동적 오염 분석 7
4. 오염 분석 최적화 8
5. Concolic Execution 8
Ⅲ. 자동 취약점 분석 도구 최적화 10
1. 반복적으로 실행되는 코드를 블록 처리 및 최적화 11
가. 오염블록 범위 설정 13
나. 코드 최적화된 오염블록 생성 14
다. 오염객체 전파과정(Propagation) 분석 15
라. 캐시 활용 15
2. 사용자 입력 값에 영향을 받는 명령어만 Concolic Execution 수행 16
가. 명시적 오염 분석(Explicit Taint Analysis) 17
나. Concolic Execution 구성 요소 21
다. 바이너리 기반 Concolic Execution 구현 23
Ⅳ. 실 험 25
1. 실험 환경 25
2. 오염블록 구현 및 실험 결과 25
3. Concolic Execution 구현 및 실험 결과 33
Ⅴ. 결 론 34
참고 문헌 35
Degree
Master
Appears in Collections:
대학원 > 정보보호학협동과정
Authorize & License
  • Authorize공개
Files in This Item:

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.