Abstract
In this paper, we proposed a tool framework of static analyzer for taint analysis of binary executable file. Dynamic taint analysis is becoming principal technique in security analysis. In particular, proposed system focuses on tracing a dynamic taint analysis. Moreover, most existing approaches are focused on data-flow based tainting. The modules of this paper use two kinds of input file type which are taint_trace file and binary executable file. Proposed system analyzes the result of dynamic taint analysis and makes control flow graph. Our proposed system is divided by three modules; taint reader, crash analyzer and code tracker. Trace reader converts trace file into readable/traceable information for a manual analyzer. Crash analyzer find out a vulnerability that is a causative factor in accrued crash. Code tracker supports a variety of binary executable file analysis. In this paper, we suggest a tool framework for dynamic taint analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Scholten M (2007) Taint analysis in practice. Vrije Universiteit Amsterdam, Amsterdam, pp 1–29
Newsome J, Song D (2004) Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. Technical report. School of computer science, Carnegie Mellon University
Christopher DM, Prabhakar R, Hinrich S (2008) Introduction to information retrieval. Technical report, Cambridge University Press, United Kingdom
Denning DE, Denning PJ (1977) Certification of programs for secure information flow. Commun ACM 20:504–513
Kang MG, McCamant S, Poosankam P, Song D (2011) DTAÂ ++: dynamic taint analysis with targeted control-flow propagation. In: 18th annual network and distributed system security symposium
Chow J, Pfaff B, Garnkel T, Christopher K, Rosenblum M (2004) Understanding data lifetime via whole system simulation. In: 13th USENIX security symposium, San Diego, pp 321–336
Song D, Brumley D, Yin H, Caballero J, Jager I, Kang MG, Liang Z, Newsome J, Poosankam P, Saxena P (2008) BitBlaze: a new approach to computer security via binary analysis. In: 4th international conference on information systems security (ICISS), information systems security. Lecture notes in computer science, pp 1–25
Yin H, Song D, Egele M, Kruegel C, Kirda E (2007) Panorama: capturing system-wide information flow for malware detection and analysis. In: Computer and communication security (CCS), Alexandria
US-CERT. Vulnerability notes database. http://www.us-cert.gov
Rahbar A Stack overow on windows vista. White paper, Sysdream
Acknowledgments
This work (Grants No. 00044301) was supported by Business for Cooperative R&D between Industry, Academy, and Research Institute funded Korea Small and Medium Business Administration in 2012.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Choi, YH., Min, JW., Park, MW., Eom, JH., Chung, TM. (2013). A Framework of Static Analyzer for Taint Analysis of Binary Executable File. In: Park, J.J., Barolli, L., Xhafa, F., Jeong, H.Y. (eds) Information Technology Convergence. Lecture Notes in Electrical Engineering, vol 253. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6996-0_20
Download citation
DOI: https://doi.org/10.1007/978-94-007-6996-0_20
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-6995-3
Online ISBN: 978-94-007-6996-0
eBook Packages: EngineeringEngineering (R0)