A Python security analysis framework in integrity verification and vulnerability detection

来源 :第十二届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:zj2008263
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Python is widely used in web crawler,machine learning,data analysis and so on.However,there is no guarantee that Python scripts are trusted in their whole lifetime because of system insecurity.When the system is attacked,scripts in the computer are likely to be tampered with.Therefore,the trustworthiness of Python scripts need to be checked through different configuration strategies which include integrity verification and vulnerability detection.In this paper,integrity verification and vulnerability detection are based on two Python scripts,an original Python script and a current Python script,and assuming the original Python script has no vulnerabilities.By comparing with the original script,we can find out whether the current script is integrity or not and detect whether there are vulnerabilities if the integrity of the current file is destroyed.Integrity verification with hash functions is not applied in some cases,since in this mode,any changes including blank lines added are considered to be illegal.So loose integrity verification by combining UNIX diff tool with abstract syntax trees is proposed.In the vulnerability detection,start from the premise that the original Python script has no vulnerabilities,the vulnerability detection framework Bandit has been improved.Besides,in order not to change the usage of Python,both integrity verification and vulnerability detection modules are embedded in Python interpreter.The experiments show that the performance of security analysis framework is good and the improved Bandit can greatly reduce the false positive without affecting the performance.
其他文献
  The security of SPECK under impossible differential cryptanalysis is studied.Based on multiple 6-round impossible differential distinguishers and combined w
  基于位置的数据服务在为用户提供生活便利的同时,不可信第三方无边界地采集个人位置、轨迹模式等信息,进行位置行为关联等分析行为存在着巨大的隐私泄露风险。针对位置数据
  Although the medical monitoring system has massive users,each of them only possesses one piece of data logging that participates in statistical computing.If
  We present an automatic algorithm for subtractive manufacturing of free form 3D objects using high-speed CNC machining.
会议
  目前,僵尸网络检测方法大多依靠对僵尸网络通信活动或通信内容的分析,前者对数据流的特征 进行统计分析,不涉及数据流中的内容,在检测加密类型方面具有较强优势,但准确性较低;
  Variety of security issues exist while all-optical networks provide high-speed transmission,therefore effective means and strategies are needed to repair fa
  As the foundation component of cloud computing platform,the virtual machine(VM)is confronted with numerous security threats.However,existing solutions tend
  高效的计算机可视化系统能够模拟人类的视觉感知系统,在可视化结果中凸显数据蕴含的重要信息和模式,从而帮助人们快速完成数据的认知过程。目前我们已经有了很多优秀的可视
会议
  高维数据可视化与可视分析旨在探索未知数据,发现潜在模式,在数据驱动的科学发现和应用领域探索中发挥着越来越重要的作用。但高维数据可视化面临着高维和未知复杂结构等挑
会议
  The inner product encry ption scheme can achieve fine-grained access control on ciphertext.For the problem that the existing inner product encry ption schem