Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Static Analysis of Injection Security Vulnerabilities Based on Symbolic Execution
SUN Jinan, PAN Kefeng, CHEN Xuefeng, ZHANG Junfu
Acta Scientiarum Naturalium Universitatis Pekinensis    2018, 54 (1): 1-13.   DOI: 10.13209/j.0479-8023.2017.101
Abstract1238)   HTML    PDF(pc) (809KB)(625)       Save

This research work receives symbols as input variables, simulates the execution of program, extracts the constraints binding with execution paths, such as security constraints, attack constraints and defense constraints, and constructs the SAT judgment matrix and UNSAT judgment matrix as injection vulnerabilities analysis models. According to the logical reduction results of the matrices, the states of injection vulnerabilities are decided. In the controlled experiments, the false positive and false negative ratios are greatly reduced, and the prototype system can generate correct exploits automatically.

Related Articles | Metrics | Comments0