使用程序分析技术防止内部恶意软件威胁

H. Agrawal, J. Alberi, L. Bahler, William Conner, Josephine Micallef, Alexandr Virodov, R. S. Shane
{"title":"使用程序分析技术防止内部恶意软件威胁","authors":"H. Agrawal, J. Alberi, L. Bahler, William Conner, Josephine Micallef, Alexandr Virodov, R. S. Shane","doi":"10.1109/MILCOM.2010.5679584","DOIUrl":null,"url":null,"abstract":"Current malware detection tools focus largely on malicious code that is injected into target programs by outsiders by exploiting inadvertent vulnerabilities such as failing to guard against a buffer overflow or failure to properly validate a user input in those programs. Hardly any attention is paid to threats arising from software developers, who, with their intimate knowledge of the inner workings of those programs, can easily sneak logic bombs, Trojan horses, and backdoors in those programs. Traditional software validation techniques such as testing based on user requirements are unlikely to detect such malware, because normal use cases will not trigger them and thus will fail to expose them. The state-of-the-art in preventing such malware involves manual inspection of the target program, which is a highly tedious, time consuming, and error prone process. We propose a dynamic, test driven approach that automatically steers program analysts towards examining and discovering such insider malware threats. It uses program analysis techniques to identify program parts whose execution automatically guarantees execution of a large number of previously unexplored parts of the program. It effectively leads analysts into creating test cases which may trigger, in a protected test environment, any malware code hidden in that application as early as possible, so it can be removed from the application before it is deployed in the field. We also present a tool that helps translate this approach into practice.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Preventing insider malware threats using program analysis techniques\",\"authors\":\"H. Agrawal, J. Alberi, L. Bahler, William Conner, Josephine Micallef, Alexandr Virodov, R. S. Shane\",\"doi\":\"10.1109/MILCOM.2010.5679584\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Current malware detection tools focus largely on malicious code that is injected into target programs by outsiders by exploiting inadvertent vulnerabilities such as failing to guard against a buffer overflow or failure to properly validate a user input in those programs. Hardly any attention is paid to threats arising from software developers, who, with their intimate knowledge of the inner workings of those programs, can easily sneak logic bombs, Trojan horses, and backdoors in those programs. Traditional software validation techniques such as testing based on user requirements are unlikely to detect such malware, because normal use cases will not trigger them and thus will fail to expose them. The state-of-the-art in preventing such malware involves manual inspection of the target program, which is a highly tedious, time consuming, and error prone process. We propose a dynamic, test driven approach that automatically steers program analysts towards examining and discovering such insider malware threats. It uses program analysis techniques to identify program parts whose execution automatically guarantees execution of a large number of previously unexplored parts of the program. It effectively leads analysts into creating test cases which may trigger, in a protected test environment, any malware code hidden in that application as early as possible, so it can be removed from the application before it is deployed in the field. We also present a tool that helps translate this approach into practice.\",\"PeriodicalId\":330937,\"journal\":{\"name\":\"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM.2010.5679584\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2010.5679584","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

目前的恶意软件检测工具主要集中在恶意代码上,这些恶意代码是由外部人员通过利用无意的漏洞注入到目标程序中的,例如未能防止缓冲区溢出或未能正确验证这些程序中的用户输入。几乎没有人注意到来自软件开发人员的威胁,他们对这些程序的内部工作原理非常了解,可以很容易地在这些程序中植入逻辑炸弹、特洛伊木马和后门。传统的软件验证技术,如基于用户需求的测试,不太可能检测到这样的恶意软件,因为正常的用例不会触发它们,因此无法暴露它们。防止此类恶意软件的最新技术包括对目标程序进行人工检查,这是一个非常繁琐、耗时且容易出错的过程。我们提出一种动态的、测试驱动的方法,自动引导程序分析人员检查和发现此类内部恶意软件威胁。它使用程序分析技术来识别程序部分,这些部分的执行自动保证了程序中大量以前未开发的部分的执行。它有效地引导分析人员创建测试用例,这些用例可能会在受保护的测试环境中触发任何隐藏在该应用程序中的恶意软件代码,因此可以在将其部署到现场之前将其从应用程序中删除。我们还提供了一个工具来帮助将这种方法转化为实践。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Preventing insider malware threats using program analysis techniques
Current malware detection tools focus largely on malicious code that is injected into target programs by outsiders by exploiting inadvertent vulnerabilities such as failing to guard against a buffer overflow or failure to properly validate a user input in those programs. Hardly any attention is paid to threats arising from software developers, who, with their intimate knowledge of the inner workings of those programs, can easily sneak logic bombs, Trojan horses, and backdoors in those programs. Traditional software validation techniques such as testing based on user requirements are unlikely to detect such malware, because normal use cases will not trigger them and thus will fail to expose them. The state-of-the-art in preventing such malware involves manual inspection of the target program, which is a highly tedious, time consuming, and error prone process. We propose a dynamic, test driven approach that automatically steers program analysts towards examining and discovering such insider malware threats. It uses program analysis techniques to identify program parts whose execution automatically guarantees execution of a large number of previously unexplored parts of the program. It effectively leads analysts into creating test cases which may trigger, in a protected test environment, any malware code hidden in that application as early as possible, so it can be removed from the application before it is deployed in the field. We also present a tool that helps translate this approach into practice.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信