期刊文献+

基于源码分析的缓冲区溢出漏洞检测方法 被引量:7

Buffer overflow detection method based on source code analysis
下载PDF
导出
摘要 根据缓冲区溢出原因提出一种基于源码分析的缓冲区溢出漏洞检测方法,该方法对源码预处理后进行静态分析并依次构造相应的抽象语法树、控制流图、函数调用图和变量表,最后建立有限状态自动机检测模型.以容易出现溢出的C/C++源码为例,构造相应的检测模型,结果表明:该检测模型相比已有检测方案,可以更加有效地检测出缓冲区溢出漏洞;同时,该方法对程序代码中的危险函数调用和溢出过滤机制也能进行有效识别从而降低误报率,该检测方法也适用于其他语言的源码检测. According to the causes of buffer overflows,a novel detection method was proposed based on source code analysis. The sources were pre-processed and analyzed statically to construct relevant abstract syntax tree,control flow graph,function call graph and variable table in sequence. A finite automata based on the developed detection model was created to detect overflows. The C / C + + program with common buffer overflows was used to demonstrate the proposed method. The extensive experimental results show that compared to existing methods,the proposed detection model can detect all buffer overflow vulnerabilities efficiently. The dangerous function calls and the overflow filtering mechanism in the code can be recognized to reduce false positive rate. The proposed method can also be easily extended to detect the buffer overflows in the codes of other language source.
作者 尹茗 张功萱
出处 《江苏大学学报(自然科学版)》 EI CAS CSCD 北大核心 2016年第4期450-455,共6页 Journal of Jiangsu University:Natural Science Edition
基金 国家自然科学基金资助项目(61472189)
关键词 缓冲区溢出检测 软件开发 有限状态自动机 静态源码分析 蠕虫 buffer overflow detection software development finite automata static code analysis worm
  • 相关文献

参考文献5

二级参考文献33

  • 1于志鹏,刘坚.一种静态检测缓冲区溢出的方法[J].计算机工程,2005,31(19):96-98. 被引量:3
  • 2叶永青,李晖,郑燕飞,洪璇,郑东.基于二进制代码的缓冲区溢出检测研究[J].计算机工程,2006,32(18):141-143. 被引量:5
  • 3代晓红.信息数据的安全与加密技术[J].重庆工商大学学报(自然科学版),2006,23(6):589-592. 被引量:8
  • 4Chris Anley, John Heasman, Felix "FX" Linder, et al. The Shelleoder "s Handbook [ M ]. Indianapolis : Wiley Publishing ,2007.
  • 5Nethercote N. Dynamic Binary Analysis and Instrumentation[D]. Cambridge, UK: University of Cambridge, 2004.
  • 6Newsome J, Song D. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software[C]//Proc. of the 12th Annual Network and Distributed System Security Symposium. San Diego, USA: [s. n.], 2005.
  • 7Bellard F. QEMU: A Fast and Portable Dynamic Translator[C]// Proc. of ATEC'05. Anaheim, USA: ACM Press, 2005: 41-45.
  • 8Portokalidis G, Slowinska A, Bos H. Argos: An Emulator for Fingerprinting Zero-day Attacks[C]//Proc. of EUROSYS'06. Leuven, Belgium: [s. n.], 2006: 15-28.
  • 9Luk Chi-Keung, Cohn R, Muth R, et al. Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation[C]//Proc. of 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation. New York, USA: ACM Press, 2005: 190-200.
  • 10Bruening D L. Efficient, Transparent, and Comprehensive Runtime Code Manipulation[D]. Cambridge, USA: Massachusetts Institute of Technology, 2004.

共引文献32

同被引文献31

引证文献7

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部