期刊文献+

基于运行时类型分析的整形漏洞二进制检测和定位系统 被引量:3

New Binary System for Detecting and Locating Integer-based Vulnerability on Run-time Type Analysis
下载PDF
导出
摘要 整形漏洞(Integer-based vulnerability)是一种存在于C或C++代码中的漏洞,具有极其严重的破坏性。2006年CVE指出缓冲区溢出漏洞呈下降趋势,而其他一些漏洞,如整形溢出、符号转换错误等呈上升趋势。设计并实现了一种针对整形漏洞的二进制实时检测和定位的方法。针对整形漏洞攻击,首先将二进制文件转化为一种中间语言VEX;然后在运行时将与外部输入相关的数据着色,截获相关语句并记录信息;最后依据制定的检测策略对着色的数据进行检测并定位。选用常见的含有内存漏洞的程序来测试系统的有效性及其性能损耗。实验结果表明,该工具可以检测并且定位软件中绝大多数的整形漏洞,而且误报和漏报率都很低。 Integer-based vulnerability is an extremely serious bug for programs written in languages such as C/C++.Common Vulnerability and Exploit(CVE) shows that as the percentage of buffer overflow has declined,there has been an increase in related vulnerability types,including integer overflows and signedness errors.Here we presented the design,implementation,and evaluation of a tool for run-time detecting and locating integer-based vulnerability.We first translated the binary code into intermediate language VEX on Valgrind,then intercepted integer related statements at run-time,recorded the necessary information,and finally detected and located vulnerability based on the checking scheme.We chose several utility applications,which contain real integer-based vulnerability,to evaluate the effectiveness and run-time performance of our system.Preliminary experimental results are quit promising,it can detect and locate most of integer-based vulnerability in real software,and has very low false positives and negatives.
出处 《计算机科学》 CSCD 北大核心 2011年第1期140-144,共5页 Computer Science
基金 863国家高技术研究项目(No.2007AA01Z448) 国家自然科学基金(60773171) 江苏省自然科学基金(BK2007136)资助
关键词 计算安全 软件安全 整形漏洞 整形溢出 Computer security Software security Integer-based vulnerability Integer overflow
  • 相关文献

参考文献22

  • 1Nethercote N, Seward J. Valgrind: A framework for heavy weight dynamic binary instrumentation[C]//Proceedings of PLDI 2007. San Diego, California, USA,June 2007.
  • 2Molnar D A,Wagner D. Catchconv:Symbolic execution and run time type inference for integer conversion errors[C]//Proceedings of EECS. 2007.
  • 3Brumley D, Chiueh Tzi-cker, et al. RICH: Automatically Protecting Against Integer-based Vulnerabilities[C]///Proceedings of the 14th Annual Network and Distributed System Security. Symposium (NDSS07). 2007.
  • 4Vulnerability Type Distributions in CEV[EB/OL]. http://eve. mitre, org/docs/vuln trends/vuln trends, pdf, 2007.
  • 5Wojtczuk R. UQBTng: a tool capable of automatically finding in teger overflows in Win32 binaries. November 2005.
  • 6Cifuentes C, et al. UQBT[EB/OL]. http://www.itee. uq. edu. au/. cristina/uqbt, html.
  • 7Necula G C, MePeak S, Weimer W. CCured:type safe retrofitting of legacy cocle[C]//Proceectings of the Symposiurn on Prin ciples of Programming Languages. 2002.
  • 8Jim T, Morrisett G, Grossman D, et al. Cyclone: A safe dialect of c[C]//USENIX Annual Technical Conference. 2002.
  • 9Seward J, Nethercote N. Using valgrind to detect undefined value errors with bit precision[C]//Proceedings of the USENIX05 Annual Technical Conference. Anaheim, California, USA, April 2005.
  • 10Howard M. Integer overflow and operator:: new[EB/OL], ht tp://btogs.msdn.com/michael howard/archive/2005/12/06/ 500629. aspx,Dec, 2006.

同被引文献12

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部