期刊文献+

A Memory-Related Vulnerability Detection Approach Based on Vulnerability Features 被引量:3

A Memory-Related Vulnerability Detection Approach Based on Vulnerability Features
原文传递
导出
摘要 Developing secure software systems is a major challenge in the software industry due to errors or weaknesses that bring vulnerabilities to the software system.To address this challenge,researchers often use the source code features of vulnerabilities to improve vulnerability detection.Notwithstanding the success achieved by these techniques,the existing studies mainly focus on the conceptual description without an accurate definition of vulnerability features.In this study,we introduce a novel and efficient Memory-Related Vulnerability Detection Approach using Vulnerability Features (MRVDAVF).Our framework uses three distinct strategies to improve vulnerability detection.In the first stage,we introduce an improved Control Flow Graph (CFG) and Pointer-related Control Flow Graph (PCFG) to describe the features of some common vulnerabilities,including memory leak,doublefree,and use-after-free.Afterward,two algorithms,namely Vulnerability Judging algorithm based on Vulnerability Feature (VJVF) and Feature Judging (FJ) algorithm,are employed to detect memory-related vulnerabilities.Finally,the proposed model is validated using three test cases obtained from Juliet Test Suite.The experimental results show that the proposed approach is feasible and effective. Developing secure software systems is a major challenge in the software industry due to errors or weaknesses that bring vulnerabilities to the software system.To address this challenge,researchers often use the source code features of vulnerabilities to improve vulnerability detection.Notwithstanding the success achieved by these techniques,the existing studies mainly focus on the conceptual description without an accurate definition of vulnerability features.In this study,we introduce a novel and efficient Memory-Related Vulnerability Detection Approach using Vulnerability Features (MRVDAVF).Our framework uses three distinct strategies to improve vulnerability detection.In the first stage,we introduce an improved Control Flow Graph (CFG) and Pointer-related Control Flow Graph (PCFG) to describe the features of some common vulnerabilities,including memory leak,doublefree,and use-after-free.Afterward,two algorithms,namely Vulnerability Judging algorithm based on Vulnerability Feature (VJVF) and Feature Judging (FJ) algorithm,are employed to detect memory-related vulnerabilities.Finally,the proposed model is validated using three test cases obtained from Juliet Test Suite.The experimental results show that the proposed approach is feasible and effective.
出处 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第5期604-613,共10页 清华大学学报(自然科学版(英文版)
基金 funded by the National Natural Science Foundation of China(Nos.U1836116 and 61872167) the Project of Jiangsu Provincial Six Talent Peaks(No.XYDXXJS-016) the Graduate Research Innovation Project of Jiangsu Province(No.KYCX171807)。
关键词 vulnerability feature Control Flow Graph(CFG) Memory Leak(ML) Double-Free(DF) Use-After-Free(UAF) vulnerability feature Control Flow Graph(CFG) Memory Leak(ML) Double-Free(DF) Use-After-Free(UAF)
  • 相关文献

参考文献2

二级参考文献48

  • 1Evans D. Static detection of dynamic memory errors. In: Proceedings of the ACM SIGPLAN 1996 Conference on Programming Language Design an Implementation. 1996, 44-53.
  • 2Bush W R, Pincus J D, Sielaff D J. A static analyzer for finding dy- namic programming errors. Software-Practice and Experience, 2000, 30(7): 775-802.
  • 3Heine D L, Lam M S. A practical flow-sensitive and context-sensitive C and C++ memory leak detector. In: Proceedings of the ACM SIG- PLAN 2003.
  • 4Conference on Programming Language Design and Im- plementation. 2003, 168-181.
  • 5Xie Y, Aiken A. Context- and path-sensitive memory leak detection. In: Proceedings of the 2005 Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFF Symposium on the Foundations of Software Engineering. 2005, 115-125.
  • 6Orlovich M, Rugina R. Memory leak analysis by contradiction. In: International Static Analysis Symposium. 2006, 405-424.
  • 7Cherem S, Princehouse L, Rugina R. Practical memory leak detec- tion using guarded value-flow analysis. In: Proceedings of the ACM SIGPLAN 2007.
  • 8Conference on Programming Language Design and Implementation. 2007, 480-491.
  • 9Xu Z, Zhang J. Path and context sensitive inter-procedural memory leak detection. In: Proceedings of the 2008 International Conference on Quality Software. 2008, 412-420.
  • 10Jung Y, Yi K. Practical memory leak detector based on parameter- ized procedural summaries. In: Proceedings of the 2008 International Symposium on Memory Management. 2008, 131-140.

共引文献11

同被引文献5

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部