OSMOSE: automatic structural testing of executables

نویسندگان

  • Sébastien Bardin
  • Philippe Herrmann
چکیده

architecture and GAL program. An abstract architectureX is defined by a pairX = 〈R,M〉 where R is a finite set of variables ranging over m-words and M is a finite set of (disjoint) arrays of mwords, called memory regions (shortly, m-regions). Each m-region is indexed by non-negative integer values, called addresses. A memory location (m-loc) is defined as being either a register or the cell of a m-region. The size of m-words stored in each m-loc is fixed a priori for each m-loc. Intuitively, variables represent registers and m-regions represent different physical memories, for example RAM and ROM. A GAL programP is a tupleP = 〈R,M, A, I〉 where 〈R,M〉 is an abstract architecture,A is the set of addresses of valid instructions and I is a map fromA to GAL instructions. GAL instructions are composed of more primitive micro-instructions. Indeed, a GAL instruction is a sequence of data (micro-) instructions followed by a control (micro-) instruction. Data instructions (assign) are multiaffectations. Basic control instructions are static jumps (goto) and dynamic jumps (cgoto). Moreover, these jumps can be combined with a conditional statement (ite). Note that instruction goto is a special case of cgoto, however they are distinguished from each other in GAL since they are managed in very different ways by automatic analysers. GAL instructions obey the following grammar: GAL instr ::= (data) control control ::= jump | ite (cond,jump,jump) jump ::= goto addr | cgoto rhs data ::= assign (lhs1, . . . , lhsn) ← f(rhs1, . . . , rhsn) Copyright c © 2009 John Wiley & Sons, Ltd. Softw. Test. Verif. Reliab. 2009; 0:0–0 Prepared using stvrauth.cls DOI: 10.1002/stvr OSMOSE: AUTOMATIC TESTING OF EXECUTABLES 7

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PE-Probe: Leveraging Packer Detection and Structural Information to Detect Malicious Portable Executables

The number of executable malware and the sophistication of their destructive ability has exponentially increased in past couple of years. Malware writers use sophisticated code obfuscation and encryption (a.k.a. packing) techniques to circumvent signatures – derived from the code of the malware for detection – stored in the signatures’ database of commercial off-the-shelf anti-virus software. I...

متن کامل

PE-Miner: Realtime Mining of ‘Structural Information’ to Detect Zero-Day Malicious Portable Executables∗

In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day malware without any a priori knowledge about them. The distinguishing features are extracted using the structural information standardized by the Microsoft Windows operating system for executables, DLLs and object files. We f...

متن کامل

Providing a structural model for psychological problems based on disconnection and rejection domain and negative automatic thoughts with mediating role of experimental avoidance

Introduction: Psychological problems are the result of a person's interaction with the environment and include behaviors that cause social conflicts, dissatisfaction and individual unhappiness. The present study aimed to provide a structural model for psychological problems based on disconnection and rejection domain and negative automatic thoughts with mediating role of experimental avoidance....

متن کامل

Artificial Immune System based General Purpose Intrusion Detection System

In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day malware without any a priori knowledge about them. The distinguishing features are extracted using the structural information standardized by the Microsoft Windows operating system for executables, DLLs and object files. We f...

متن کامل

PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime

In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day (i.e. previously unknown) malware. The distinguishing features are extracted using the structural information standardized by the Microsoft Windows operating system for executables, DLLs and object files. We follow a threefol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Softw. Test., Verif. Reliab.

دوره 21  شماره 

صفحات  -

تاریخ انتشار 2011