Skip to main content

A Framework of Static Analyzer for Taint Analysis of Binary Executable File

  • Conference paper
Information Technology Convergence

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 253))

Abstract

In this paper, we proposed a tool framework of static analyzer for taint analysis of binary executable file. Dynamic taint analysis is becoming principal technique in security analysis. In particular, proposed system focuses on tracing a dynamic taint analysis. Moreover, most existing approaches are focused on data-flow based tainting. The modules of this paper use two kinds of input file type which are taint_trace file and binary executable file. Proposed system analyzes the result of dynamic taint analysis and makes control flow graph. Our proposed system is divided by three modules; taint reader, crash analyzer and code tracker. Trace reader converts trace file into readable/traceable information for a manual analyzer. Crash analyzer find out a vulnerability that is a causative factor in accrued crash. Code tracker supports a variety of binary executable file analysis. In this paper, we suggest a tool framework for dynamic taint analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Scholten M (2007) Taint analysis in practice. Vrije Universiteit Amsterdam, Amsterdam, pp 1–29

    Google Scholar 

  2. Newsome J, Song D (2004) Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. Technical report. School of computer science, Carnegie Mellon University

    Google Scholar 

  3. Christopher DM, Prabhakar R, Hinrich S (2008) Introduction to information retrieval. Technical report, Cambridge University Press, United Kingdom

    Google Scholar 

  4. Denning DE, Denning PJ (1977) Certification of programs for secure information flow. Commun ACM 20:504–513

    Article  Google Scholar 

  5. Kang MG, McCamant S, Poosankam P, Song D (2011) DTA ++: dynamic taint analysis with targeted control-flow propagation. In: 18th annual network and distributed system security symposium

    Google Scholar 

  6. Chow J, Pfaff B, Garnkel T, Christopher K, Rosenblum M (2004) Understanding data lifetime via whole system simulation. In: 13th USENIX security symposium, San Diego, pp 321–336

    Google Scholar 

  7. Song D, Brumley D, Yin H, Caballero J, Jager I, Kang MG, Liang Z, Newsome J, Poosankam P, Saxena P (2008) BitBlaze: a new approach to computer security via binary analysis. In: 4th international conference on information systems security (ICISS), information systems security. Lecture notes in computer science, pp 1–25

    Google Scholar 

  8. Yin H, Song D, Egele M, Kruegel C, Kirda E (2007) Panorama: capturing system-wide information flow for malware detection and analysis. In: Computer and communication security (CCS), Alexandria

    Google Scholar 

  9. US-CERT. Vulnerability notes database. http://www.us-cert.gov

  10. Rahbar A Stack overow on windows vista. White paper, Sysdream

    Google Scholar 

Download references

Acknowledgments

This work (Grants No. 00044301) was supported by Business for Cooperative R&D between Industry, Academy, and Research Institute funded Korea Small and Medium Business Administration in 2012.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jung-Ho Eom .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Choi, YH., Min, JW., Park, MW., Eom, JH., Chung, TM. (2013). A Framework of Static Analyzer for Taint Analysis of Binary Executable File. In: Park, J.J., Barolli, L., Xhafa, F., Jeong, H.Y. (eds) Information Technology Convergence. Lecture Notes in Electrical Engineering, vol 253. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6996-0_20

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-6996-0_20

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-6995-3

  • Online ISBN: 978-94-007-6996-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics