网络与信息安全学报 ›› 2020, Vol. 6 ›› Issue (1): 94-108.doi: 10.11959/j.issn.2096-109x.2020004

• 学术论文 • 上一篇    

基于流量分析的软件升级漏洞自动检测方法

腾金辉(),光焱,舒辉,张冰   

  1. 战略支援部队信息工程大学,河南 郑州 450001
  • 修回日期:2019-08-12 出版日期:2020-02-15 发布日期:2020-03-23
  • 作者简介:腾金辉(1996- ),男,河南洛阳人,战略支援部队信息工程大学助理研究员,主要研究方向为基于大数据的安全机制分析以及漏洞利用|光焱(1983- ),男,安徽枞阳人,博士,战略支援部队信息工程大学讲师,主要研究方向为安全机制分析与漏洞挖掘|舒辉(1974- ),男,江苏盐城人,战略支援部队信息工程大学教授、博士生导师,主要研究方向为网络安全、漏洞检测|张冰(1989- ),男,河南郑州人,硕士 ,主要研究方向为软件工程
  • 基金资助:
    国家重点研发计划基金资助项目(2018YFB08011601)

Automatic detection method of software upgrade vulnerability based on network traffic analysis

Jinhui TENG(),Yan GUANG,Hui SHU,Bing ZHANG   

  1. Strategic Support Force Information Engineering University,Zhengzhou 450001,China
  • Revised:2019-08-12 Online:2020-02-15 Published:2020-03-23
  • Supported by:
    The National Key R & D Program of China(2018YFB08011601)

摘要:

软件升级过程中,缺乏对升级信息或升级包的认证可能会导致基于中间人攻击的远程代码执行漏洞。为此,提出一种升级漏洞自动检测方法。该方法通过提取升级过程中的网络流量,对升级机制自动画像,将其与漏洞特征向量匹配,预判升级漏洞;在模拟验证环境中,利用画像信息实施中间人攻击,验证检测结果。基于该方法设计了升级漏洞自动分析与验证系统,对 184 个 Windows 应用软件样本进行测试,检测出 117个样本的升级漏洞,证明了本方法的有效性。

关键词: 软件升级, 流量分析, 漏洞检测, 自动化分析与验证

Abstract:

During the software upgrade process,the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.An automatic detection method for upgrading vulnerabilities was proposed.The method described the upgrade mechanism by extracting the network traffic during the upgrade process,then matched it with the vulnerability feature vector to anticipate upgrading vulnerabilities.In a validation environment,the man-in-the-middle attack using the portrait information was carried out to verify the detection results.In addition,an automatic vulnerability analysis and verification system based on this method was designed.184 Windows applications samples was test and 117 upgrade vulnerabilities were detected in these samples,which proved validity of the method.

Key words: software upgrade, network traffic analysis, vulnerability detection, automated analysis and validation

中图分类号: 

No Suggested Reading articles found!