CN114417343A - Operating system kernel information leakage vulnerability detection method under binary file - Google Patents

Operating system kernel information leakage vulnerability detection method under binary file Download PDF

Info

Publication number
CN114417343A
CN114417343A CN202011174860.9A CN202011174860A CN114417343A CN 114417343 A CN114417343 A CN 114417343A CN 202011174860 A CN202011174860 A CN 202011174860A CN 114417343 A CN114417343 A CN 114417343A
Authority
CN
China
Prior art keywords
code
pointer
vulnerability
unit
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011174860.9A
Other languages
Chinese (zh)
Other versions
CN114417343B (en
Inventor
张媛媛
彭诗言
喻东徽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiaotong University
Original Assignee
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiaotong University filed Critical Shanghai Jiaotong University
Priority to CN202011174860.9A priority Critical patent/CN114417343B/en
Publication of CN114417343A publication Critical patent/CN114417343A/en
Application granted granted Critical
Publication of CN114417343B publication Critical patent/CN114417343B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

A method for detecting kernel information leakage loopholes of an operating system under a binary file comprises the steps of carrying out pre-analysis processing on a binary code to be analyzed to obtain the using condition of a binary code pointer; then, performing symbolic execution on the binary codes to obtain symbolic execution expressions and performing potential vulnerability judgment; and finally, judging whether the corresponding kernel information leakage vulnerability is determined according to the further sensitive information of the code mode with the vulnerability risk obtained by vulnerability judgment. According to the method, the binary codes are cut into the functions by utilizing the disclosed symbolic information, the property analysis of the parameters is carried out on the parameter reference of the functions by using the code slices, and the kernel privacy leakage analysis is carried out through symbolic execution, so that the problem of information leakage contained in the kernel of the operating system is effectively found, and the safety of the operating system is ensured.

Description

Operating system kernel information leakage vulnerability detection method under binary file
Technical Field
The invention relates to a technology in the field of information security, in particular to a method for detecting kernel information leakage vulnerability of an operating system under a binary file.
Background
The kernel information leakage vulnerability of the operating system is a type of hidden security vulnerability, and the kernel information leakage vulnerability of the operating system is analyzed mainly by using analysis based on source codes and analysis based on full-system simulation, and is limited in that: the source code-based scheme requires an analyst to master the source code, and often, a third party authorized analyst does not have such conditions and the system-wide simulation-based scheme cannot well cover the entire logic of the analysis target program, so that the analysis process is difficult to complete.
These limitations may be addressed using a binary symbolic execution method that may be performed without source code and that may guarantee that the full logic of the target program is covered. The existing binary symbol execution method cannot well analyze the kernel information leakage vulnerability of the operating system because: binary symbolic execution does not realize the identification of pointer properties, and kernel information leakage loopholes of an operating system often occur in a special pointer such as a user-mode pointer; the symbol execution method generally has the efficiency problem caused by path explosion, and for the binary program of the kernel of the operating system, the path combination is more complex, and a good method is needed to process the path explosion problem; the code mode can be obtained in the process of symbolic execution, but the code mode corresponding to the kernel information vulnerability is similar to some benign code modes, and further judgment needs to be carried out on the basis of the result of symbolic execution.
Disclosure of Invention
The invention provides a method for detecting the kernel information leakage vulnerability of an operating system under a binary file aiming at the defects of poor operability and the like of the existing vulnerability analysis scheme based on source codes.
The invention is realized by the following technical scheme:
the invention relates to a method for detecting kernel information leakage loopholes of an operating system under a binary file, which obtains the using condition of a binary code pointer by performing pre-analysis processing on a binary code to be analyzed; then, performing symbolic execution on the binary codes to obtain symbolic execution expressions and performing potential vulnerability judgment; and finally, judging whether the corresponding kernel information leakage vulnerability is determined according to the further sensitive information of the code mode with the vulnerability risk obtained by vulnerability judgment.
The pre-analysis processing is automatically realized by means of a code slicing technology.
The use cases comprise: the functions involved in the code and their corresponding user-state pointers, the method of the code to use the code slice, and the access patterns of all pointers.
The symbolic execution means: according to the use condition of the binary code pointer, only the path corresponding to the sequence formed by the nodes where the memory access is located from the starting point in the control flow graph of the execution function is obtained, and the symbolic execution expression is obtained from the execution result.
The symbolic execution expression comprises: pointer variables, uninitialized value variables, instruction constants and their assignment operations, and boolean symbols linking assignment operations.
The potential vulnerability judgment is as follows: and performing proposition formula satisfiability judgment on the symbolic execution expression, and judging whether the code mode corresponding to the current path has a potential vulnerability or not when the proposition can be satisfied and ambiguity exists.
Whether the corresponding kernel information leakage vulnerability is determined or not is determined by: by statically analyzing the pointer property of data related to the code with the vulnerability risk, searching the use method of the data in the code, judging whether the pointer property is a pointer or a constant and judging whether the code mode with the vulnerability risk really corresponds to the kernel information leakage vulnerability, specifically: and finally, confirming that the risk code mode really has a bug when the value domain meeting the proposition with ambiguity contains the pointer variable.
The invention relates to a system for realizing the method, which comprises the following steps: pre-analysis module, symbol execution module and threat decision module, wherein: the pre-analysis module performs function cutting and code slicing processing according to the disclosed symbolic information, the information contained in the binary file format and the information of the binary codes and outputs the parameter properties of the functions to obtain function information results and output the function information results to the symbolic execution module, the symbolic execution module obtains expression results according to symbolic execution and outputs the expression results to the threat determination module, and the threat determination module solves the expression results and obtains the detection results of the kernel leakage loopholes of the operating system.
Technical effects
The invention integrally solves the problem that the kernel information of the operating system cannot be automatically and statically analyzed in the prior art is leaked.
Compared with the prior art, the method can identify the sensitive path identification related to the kernel information leakage vulnerability of the operating system, judge the functional property of kernel information exchange of the operating system on the basis of the binary code, and judge the pointer property related to kernel information leakage
Drawings
FIG. 1 is a schematic diagram of a pre-analysis module of the present invention;
FIG. 2 is a schematic diagram of a symbol execution module according to the present invention;
fig. 3 is a schematic diagram of a threat determination module according to the present invention.
Detailed Description
The embodiment relates to an automatic detection system for kernel information leakage vulnerability of an operating system based on binary symbolic execution, which comprises: the system comprises a pre-analysis module, a symbol execution module and a threat judgment module.
The pre-analysis module comprises: the system comprises a binary file analyzing unit, a user pointer related function identifying unit, a pointer access analyzing unit and a function property sorting unit, wherein: the analysis binary file unit is associated with the identification user pointer related function unit, the function head and tail information is delivered to the identification user pointer related function unit, the identification user pointer related function unit is connected with the pointer analysis unit, the identification user pointer related function unit delivers the function information used by the user pointer to the pointer access analysis unit, the pointer access analysis unit delivers the pointer property and the access mode used by the function to the function property sorting unit, and the function property sorting unit outputs the function property database.
The symbol execution module comprises: a symbol execution engine unit and a code pattern processing unit, wherein: the symbolic execution engine unit obtains functional property information from the functional property database, generates a path transfer expression by combining the functional property information in the execution process, splices the instruction-level symbolic execution result expression to obtain a code mode, is connected with the code mode processing unit and transmits code mode information, and the code mode processing unit inputs the code mode information, screens out problematic code modes and outputs a dangerous function code mode database.
The threat determination module comprises: data identification unit, code section unit, data nature judge unit and vulnerability confirm unit, wherein: the data identification unit obtains a danger function code mode from a danger function code mode database, is connected with the code slicing unit, transmits a data position in the danger function code mode to the code slicing unit, the code slicing unit slices the code according to the data position and outputs data access information, the data property judgment unit judges the property of the data according to the data access information and transmits the property of the data to the vulnerability confirmation unit, and the vulnerability confirmation unit judges whether the code mode corresponds to the vulnerability code according to the data property and the code mode.
The embodiment relates to a vulnerability detection method of the system, which comprises the steps of carrying out pre-analysis processing on binary codes to be analyzed to obtain the using condition of a binary code pointer; then, performing symbolic execution on the binary codes to obtain symbolic execution expressions and performing potential vulnerability judgment; and finally, judging whether the corresponding kernel information leakage vulnerability is determined according to the further sensitive information of the code mode with the vulnerability risk obtained by vulnerability judgment.
As shown in fig. 1, the pre-analysis process includes the following steps:
step 101, analyzing a binary file, and identifying function information in the file;
102, screening out functions accessed by the user pointer according to the function information;
103, analyzing and slicing the pointer access of the screened function, and combining the relation between the authority related pointer and the user pointer to obtain the information of the use condition of the user pointer;
and 104, generating a symbol execution expression for the data related to the user pointer according to the slicing result, namely the use condition of the binary code pointer.
As shown in fig. 2, the symbolic execution includes the following steps:
step 201, starting to execute symbol execution on the binary file based on the input binary file, wherein each symbol execution takes a function as a starting point, and the initial state is set to be full empty;
step 202, when control flow transfer related to a user pointer occurs in the symbol execution process, abandoning the transfer and directly executing a symbol execution expression obtained by pre-analysis processing;
step 203, generating expressions for all operations generated in the symbol execution process, and splicing all the obtained expressions to obtain a code mode;
and 204, solving the code mode, simplifying the code mode, and determining whether the code mode is dangerous or not according to a simplification result.
As shown in fig. 3, the sensitive information determination includes the following steps:
step 301: the code pattern is split into source data and general data and data associated with the user-mode pointers is identified.
Step 302: and slicing based on the obtained data information, and finding out the access mode of the adjacent codes to the data.
Step 303: and judging whether the data is a pointer or sensitive information according to the access mode of the data.
Step 304: and when the effective range of the sensitive information exists in the code mode and participates in the write operation of the user mode pointer, judging that the vulnerability is established, and obtaining a vulnerability detection result of the kernel leakage of the operating system.
Through specific practical experiments, under the specific environment setting of a 7700HQ CPU and a 16G RAM common computer, by taking win32kfull.sys, ntoskrnl.exe files in 5 months of 2020 as parameters, experimental data can be obtained as follows: obtain a database containing information about the nature of the function, output function win32 k! fnHkINLPDEBHUGHOOKSTRUCT and ntoskrnl! MmQueryVirtualMemory is a leaky function.
Compared with the prior art, the method can analyze the code of the kernel information leakage vulnerability under the static condition, and can successfully and automatically analyze the vulnerability which cannot be analyzed by the conventional automatic scheme.
The foregoing embodiments may be modified in many different ways by those skilled in the art without departing from the spirit and scope of the invention, which is defined by the appended claims and all changes that come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.

Claims (11)

1. A method for detecting kernel information leakage vulnerability of an operating system under a binary file is characterized in that the using condition of a binary code pointer is obtained by performing pre-analysis processing on a binary code to be analyzed; then, performing symbolic execution on the binary codes to obtain symbolic execution expressions and performing potential vulnerability judgment; finally, judging whether the corresponding kernel information leakage vulnerability is determined according to the further sensitive information of the code mode with the vulnerability risk obtained by vulnerability judgment;
the pre-analysis processing is automatically realized by a code slicing technical means;
the use cases comprise: functions involved in the code and their corresponding user-mode pointers, the method of the code using the code slice, and the access mode of all pointers;
the symbolic execution expression comprises: pointer variables, uninitialized value variables, instruction constants and their assignment operations, and boolean symbols linking assignment operations.
2. The method for detecting kernel information leakage vulnerability of operating system under binary file according to claim 1, wherein said symbolic execution means: according to the use condition of the binary code pointer, only the path corresponding to the sequence formed by the nodes where the memory access is located from the starting point in the control flow graph of the execution function is obtained, and the symbolic execution expression is obtained from the execution result.
3. The method for detecting the kernel information leakage vulnerability of the operating system under the binary file according to claim 1, wherein the potential vulnerability determination means: and performing proposition formula satisfiability judgment on the symbolic execution expression, and judging whether the code mode corresponding to the current path has a potential vulnerability or not when the proposition can be satisfied and ambiguity exists.
4. The method for detecting kernel information leakage vulnerability of operating system under binary file according to claim 1, wherein whether to determine the corresponding kernel information leakage vulnerability is: by statically analyzing the pointer property of data related to the code with the vulnerability risk, searching the use method of the data in the code, judging whether the pointer property is a pointer or a constant and judging whether the code mode with the vulnerability risk really corresponds to the kernel information leakage vulnerability, specifically: and finally, confirming that the risk code mode really has a bug when the value domain meeting the proposition with ambiguity contains the pointer variable.
5. The method for detecting the kernel information leakage vulnerability of the operating system under the binary file according to claim 1, wherein the pre-analysis processing comprises the following steps:
step 101, analyzing a binary file, and identifying function information in the file;
102, screening out functions accessed by the user pointer according to the function information;
103, analyzing and slicing the pointer access of the screened function, and combining the relation between the authority related pointer and the user pointer to obtain the information of the use condition of the user pointer;
and 104, generating a symbol execution expression for the data related to the user pointer according to the slicing result, namely the use condition of the binary code pointer.
6. The method for detecting kernel information leakage vulnerability of operating system under binary file according to claim 1 or 2, wherein said symbolic execution comprises the following steps:
step 201, starting to execute symbol execution on the binary file based on the input binary file, wherein each symbol execution takes a function as a starting point, and the initial state is set to be full empty;
step 202, when control flow transfer related to a user pointer occurs in the symbol execution process, abandoning the transfer and directly executing a symbol execution expression obtained by pre-analysis processing;
step 203, generating expressions for all operations generated in the symbol execution process, and splicing all the obtained expressions to obtain a code mode;
and 204, solving the code mode, simplifying the code mode, and determining whether the code mode is dangerous or not according to a simplification result.
7. The method for detecting the kernel information leakage vulnerability of the operating system under the binary file according to claim 1, wherein the sensitive information judgment comprises the following steps:
step 301: splitting the code mode into source data and general data and identifying data related to the user mode pointer;
step 302: slicing based on the obtained data information, and finding out an access mode of adjacent codes to the data;
step 303: judging whether the data is a pointer or sensitive information according to the access mode of the data;
step 304: and when the effective range of the sensitive information exists in the code mode and participates in the write operation of the user mode pointer, judging that the vulnerability is established, and obtaining a vulnerability detection result of the kernel leakage of the operating system.
8. A system for implementing the method of any preceding claim, comprising: pre-analysis module, symbol execution module and threat decision module, wherein: the pre-analysis module performs function cutting and code slicing processing according to the disclosed symbolic information, the information contained in the binary file format and the information of the binary codes and outputs the parameter properties of the functions to obtain function information results and output the function information results to the symbolic execution module, the symbolic execution module obtains expression results according to symbolic execution and outputs the expression results to the threat determination module, and the threat determination module solves the expression results and obtains the detection results of the kernel leakage loopholes of the operating system.
9. The system of claim 8, wherein said pre-analysis module comprises: the system comprises a binary file analyzing unit, a user pointer related function identifying unit, a pointer access analyzing unit and a function property sorting unit, wherein: the analysis binary file unit is associated with the identification user pointer related function unit, the function head and tail information is delivered to the identification user pointer related function unit, the identification user pointer related function unit is connected with the pointer analysis unit, the identification user pointer related function unit delivers the function information used by the user pointer to the pointer access analysis unit, the pointer access analysis unit delivers the pointer property and the access mode used by the function to the function property sorting unit, and the function property sorting unit outputs the function property database.
10. The system of claim 8, wherein said symbol execution module comprises: a symbol execution engine unit and a code pattern processing unit, wherein: the symbolic execution engine unit obtains functional property information from the functional property database, generates a path transfer expression by combining the functional property information in the execution process, splices the instruction-level symbolic execution result expression to obtain a code mode, is connected with the code mode processing unit and transmits code mode information, and the code mode processing unit inputs the code mode information, screens out problematic code modes and outputs a dangerous function code mode database.
11. The system of claim 8, wherein said threat determination module comprises: data identification unit, code section unit, data nature judge unit and vulnerability confirm unit, wherein: the data identification unit obtains a danger function code mode from a danger function code mode database, is connected with the code slicing unit, transmits a data position in the danger function code mode to the code slicing unit, the code slicing unit slices the code according to the data position and outputs data access information, the data property judgment unit judges the property of the data according to the data access information and transmits the property of the data to the vulnerability confirmation unit, and the vulnerability confirmation unit judges whether the code mode corresponds to the vulnerability code according to the data property and the code mode.
CN202011174860.9A 2020-10-28 2020-10-28 Method for detecting kernel information leakage loopholes of operating system under binary files Active CN114417343B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011174860.9A CN114417343B (en) 2020-10-28 2020-10-28 Method for detecting kernel information leakage loopholes of operating system under binary files

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011174860.9A CN114417343B (en) 2020-10-28 2020-10-28 Method for detecting kernel information leakage loopholes of operating system under binary files

Publications (2)

Publication Number Publication Date
CN114417343A true CN114417343A (en) 2022-04-29
CN114417343B CN114417343B (en) 2024-07-05

Family

ID=81260403

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011174860.9A Active CN114417343B (en) 2020-10-28 2020-10-28 Method for detecting kernel information leakage loopholes of operating system under binary files

Country Status (1)

Country Link
CN (1) CN114417343B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130055207A1 (en) * 2011-08-29 2013-02-28 Microsoft Corporation Demand-driven analysis of pointers for software program analysis and debugging
US20150227746A1 (en) * 2014-02-07 2015-08-13 Northwestern University System and Method for Privacy Leakage Detection and Prevention System without Operating System Modification
CN104899514A (en) * 2015-06-17 2015-09-09 上海斐讯数据通信技术有限公司 Guiding symbol based mobile terminal malicious behavior detection method and system
CN107992307A (en) * 2017-12-11 2018-05-04 北京奇虎科技有限公司 A kind of function Compilation Method and device
WO2018101575A1 (en) * 2016-11-29 2018-06-07 한국전력공사 Binary code-based embedded software vulnerability analysis device and method therefor
CN108171061A (en) * 2018-01-16 2018-06-15 武汉轻工大学 A kind of Android system Kernel security detection method and device
CN109492406A (en) * 2018-11-15 2019-03-19 百度在线网络技术(北京)有限公司 Monitor the methods, devices and systems of kernel loophole attack
CN109840416A (en) * 2017-11-28 2019-06-04 西安玖诚玖谊实业有限公司 Malicious code behavior automatic analysis system
CN111240687A (en) * 2020-01-09 2020-06-05 华东师范大学 Source code static analysis device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130055207A1 (en) * 2011-08-29 2013-02-28 Microsoft Corporation Demand-driven analysis of pointers for software program analysis and debugging
US20150227746A1 (en) * 2014-02-07 2015-08-13 Northwestern University System and Method for Privacy Leakage Detection and Prevention System without Operating System Modification
CN104899514A (en) * 2015-06-17 2015-09-09 上海斐讯数据通信技术有限公司 Guiding symbol based mobile terminal malicious behavior detection method and system
WO2018101575A1 (en) * 2016-11-29 2018-06-07 한국전력공사 Binary code-based embedded software vulnerability analysis device and method therefor
CN109840416A (en) * 2017-11-28 2019-06-04 西安玖诚玖谊实业有限公司 Malicious code behavior automatic analysis system
CN107992307A (en) * 2017-12-11 2018-05-04 北京奇虎科技有限公司 A kind of function Compilation Method and device
CN108171061A (en) * 2018-01-16 2018-06-15 武汉轻工大学 A kind of Android system Kernel security detection method and device
CN109492406A (en) * 2018-11-15 2019-03-19 百度在线网络技术(北京)有限公司 Monitor the methods, devices and systems of kernel loophole attack
CN111240687A (en) * 2020-01-09 2020-06-05 华东师范大学 Source code static analysis device

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
PAUL MUNTEAN 等: "Context-sensitive detection of Information exposure bugs with symbolic execution", INNOSWDEV 2014:PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON INNOVATION SOFTWARE DEVELOPMENT METHDOLOGIES AND PRACTICES, 30 November 2014 (2014-11-30), pages 84 - 93 *
SHENGJIAN GUO 等: "Adversarial symbolic execution for detecting concurrency-related cache timing leaks", ESEC/FSE 2018:PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 31 October 2018 (2018-10-31), pages 377 - 388, XP058699281, DOI: 10.1145/3236024.3236028 *
周宽久;杨广;赖晓晨;崔凯;姚艳双;: "基于控制流切片的代码安全缺陷检测方法", 计算机工程与设计, no. 06, 16 June 2012 (2012-06-16), pages 2265 - 2271 *
彭诗言: "一种基于符号污点执行的操作系统内核信息泄露漏洞检测方法", 中国优秀硕士学位论文全文数据库 信息科技辑, no. 01, 15 January 2024 (2024-01-15), pages 138 - 187 *
徐永健;王丹;陈渝;范文良;: "使用符号化驱动环境检测Linux设备驱动程序的漏洞", 计算机工程与科学, no. 02, 15 February 2016 (2016-02-15), pages 290 - 296 *
李伟;苏璞睿;: "基于内核驱动的恶意代码动态检测技术", 中国科学院研究生院学报, no. 05, 15 September 2010 (2010-09-15), pages 695 - 703 *
陈恺;冯登国;苏璞睿;: "基于有限约束满足问题的溢出漏洞动态检测方法", 计算机学报, no. 05, 15 May 2012 (2012-05-15), pages 898 - 909 *

Also Published As

Publication number Publication date
CN114417343B (en) 2024-07-05

Similar Documents

Publication Publication Date Title
CN109992970B (en) JAVA deserialization vulnerability detection system and method
US8171551B2 (en) Malware detection using external call characteristics
US11455400B2 (en) Method, system, and storage medium for security of software components
US20170372068A1 (en) Method to identify known compilers functions, libraries and objects inside files and data items containing an executable code
Mirsky et al. {VulChecker}: Graph-based Vulnerability Localization in Source Code
KR101640479B1 (en) Software vulnerability attack behavior analysis system based on the source code
Li et al. A novel approach for software vulnerability classification
KR20180010053A (en) Extraction system and method of risk code for vulnerability analysis
Filus et al. Software vulnerabilities in TensorFlow-based deep learning applications
CN112115473A (en) Method for security detection of Java open source assembly
CN114462044A (en) UEFI (unified extensible firmware interface) firmware vulnerability static detection method and device based on taint analysis
Lubuva et al. A review of static malware detection for Android apps permission based on deep learning
Zahan et al. Shifting the Lens: Detecting Malware in npm Ecosystem with Large Language Models
You et al. Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART)
Samhi et al. Negative results of fusing code and documentation for learning to accurately identify sensitive source and sink methods: An application to the android framework for data leak detection
Borzykh et al. Detecting Code Security Breaches by Means of Dataflow Analysis
CN109299610B (en) Method for verifying and identifying unsafe and sensitive input in android system
CN114417343B (en) Method for detecting kernel information leakage loopholes of operating system under binary files
US11250127B2 (en) Binary software composition analysis
Marashdih et al. The problems and challenges of infeasible paths in static analysis
Staderini et al. Security Evaluation and Improvement of Solidity Smart Contracts
CN113392016B (en) Protocol generation method, device, equipment and medium for processing program abnormal condition
EP3692456A1 (en) Binary image stack cookie protection
Xiaomeng et al. A survey on source code review using machine learning
Fülöp et al. Comprehensive Evaluation of Cross Translation Unit Symbolic Execution.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant