An integer overflow detection method based on integer variable unification

被引:0
|
作者
Xu, Guo-Ai [1 ]
Zhang, Miao [1 ]
Chen, Ai-Guo [1 ]
Li, Zhong-Xian [2 ]
机构
[1] National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
[2] National Cybernet Security Limited, Tianjin 300052, China
关键词
Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
Through analyzing the principium of integer overflow, an integer overflow detection method on software source code is proposed which is based on integer variable unification. We presented the integer variable unification method and defined three unified actions which were used in three given cases. Then the detection process was described, it simplified integer overflow flaw into mathematic inequalities, and removed the influence of context to the objective variable. Finally, instances were provided to demonstrate the effectiveness and practicability of the presented method.
引用
收藏
页码:90 / 93
相关论文
共 50 条
  • [41] INTEGER PROGRAMMING PROBLEM WITH VARIABLE COEFFICIENTS
    LEVYI, VD
    VOLODIN, AA
    [J]. MATEKON, 1976, 12 (03): : 75 - 83
  • [42] A Medical Image Steganography Method Based on Integer Wavelet Transform and Overlapping Edge Detection
    Al-Dmour, Hayat
    Al-Ani, Ahmed
    [J]. NEURAL INFORMATION PROCESSING, ICONIP 2015, PT IV, 2015, 9492 : 436 - 444
  • [43] IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time
    Zhang, Chao
    Wang, Tielei
    Wei, Tao
    Chen, Yu
    Zou, Wei
    [J]. COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 71 - 86
  • [44] Image Watermarking Method Using Integer-to-Integer Wavelet Transforms
    陈韬
    王京春
    [J]. Tsinghua Science and Technology, 2002, (05) : 508 - 512
  • [45] An image steganography method based on integer wavelet transform
    Miri, Aref
    Faez, Karim
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (11) : 13133 - 13144
  • [46] Detecting Integer Overflow Vulnerabilities in Binary Executables Based on Target Filtering and Dynamic Taint Tracing
    CUI Baojiang
    LIANG Xiaobing
    ZHAO Bing
    ZHAI Feng
    WANG Jianxin
    [J]. Chinese Journal of Electronics, 2014, 23 (02) : 348 - 352
  • [47] An image steganography method based on integer wavelet transform
    Aref Miri
    Karim Faez
    [J]. Multimedia Tools and Applications, 2018, 77 : 13133 - 13144
  • [48] Optimization of speckle pattern based on integer programming method
    Xu, Xiangyang
    Ren, Xiangyun
    Zhong, Fuqiang
    Quan, Chenggen
    He, Xiaoyuan
    [J]. OPTICS AND LASERS IN ENGINEERING, 2020, 133
  • [49] Detecting Integer Overflow Vulnerabilities in Binary Executables Based on Target Filtering and Dynamic Taint Tracing
    Cui Baojiang
    Liang Xiaobing
    Zhao Bing
    Zhai Feng
    Wang Jianxin
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (02) : 348 - 352