The interactive mechanism of static and dynamic analysis in the reverse analysis of embedded software

被引:0
作者
Tie-Ming L. [1 ]
Lie-Hui J. [1 ]
Jing-Si Z. [2 ]
Gang M. [1 ]
机构
[1] The State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou
[2] ZhengZhou University of Science and Technology, Zhengzhou
来源
International Journal of Multimedia and Ubiquitous Engineering | 2016年 / 11卷 / 10期
基金
国家高技术研究发展计划(863计划);
关键词
Dynamic analysis; Dynamic and static combination; Embedded software; Interactive mechanism; Software reverse analysis; Static analysis;
D O I
10.14257/ijmue.2016.11.10.03
中图分类号
学科分类号
摘要
Because the software reverse analysis method which combined the dynamic and static analyses lacks normative interactive mode, the work of the software reverse analysis is inefficient, and its reusability is poor. Based on dynamic and static analysis process of the embedded software, three kinds of interactive mechanism are proposed, including Static To Dynamic (STD), Dynamic To Static (DTS), Static and Dynamic simultaneous (SDM), and has also presented the method of realizing these three interaction mechanisms in detail. The test results show that interactive mechanisms of STD, DTS and SDM are suitable for correction of abnormal nodes in the results of static analysis, optimization of dynamic information extraction, identification of hidden codes and so on. It can greatly improve work efficiency of the embedded software reverse analysis. © 2016 SERSC.
引用
收藏
页码:33 / 44
页数:11
相关论文
共 12 条
[1]  
Kinder J., Static Analysis of X86 Executables, (2010)
[2]  
Reps B.G., Wysinwyx T., What you see is not what you execute, ACM Transactions on Programming Languages and Systems (TOPLAS), 32, 6, pp. 23-24, (2010)
[3]  
Schwartz E.J., Avgerinos T., Brumley D., All you ever wanted to know about dynamic taint analysis and forward symbolic execution (But might have been afraid to ask), IEEE Symposium on Security and Privacy, pp. 317-333, (2010)
[4]  
Clarke P., Embedded Systems Next for Hack Attacks, (2015)
[5]  
Serpanos D., Voyiatzis A.G., Security Challenges in Embedded Systems, ACM Transactions on Embedded Computing Systems (TECS), 12, 66, (2013)
[6]  
Hui J.L., Research on Key Techniques for Firm-Code Reverse Analysis, (2007)
[7]  
Cifuentes C., The University of Queensland Binary Translator (UQBT) Framework, (2002)
[8]  
Ying L.X., Research on Technologies of Control Flow Reconstruction and Control Structure Recovery in Decompilation, (2010)
[9]  
Qemu B.F., A Fast and Portable Dynamic Translator. Proceedings of the FREENIX Track: 2005 USENIX Annual Technical Conference, pp. 41-46, (2005)
[10]  
Dan L., Research on Control Flow Reconstruction of Multi-Source Decompilation, (2013)