Dynamic and static analyses of integer overflow vulnerabilities

被引:0
|
作者
机构
[1] [1,Qi, Lanlan
[2] Wen, Jiangtao
[3] Chen, Yu
[4] Xiao, Qixue
来源
Wen, Jiangtao | 1600年 / Tsinghua University卷 / 54期
关键词
False positive - Integer overflow - Linux kernel - Software vulnerabilities - Symbolic execution - Vulnerability analysis;
D O I
暂无
中图分类号
学科分类号
摘要
Different software vulnerabilities have different characteristics. 220 integer overflow vulnerabilities are analyzed to develop three kinds of detection strategies to reduce the false positives from static analyses. Static analyses identify the type of integer overflow while dynamic analyses accurately identify the integer overflow vulnerability. This method combines the advantages of the two analyses to detect vulnerabilities. The static analysis is used to detect the integer overflow and obtain the integer overflow type and related information. This information is then used by the dynamic analysis to insert hooks into the code using the automatic pile technique. Then, the algorithm calls the integer overflow marker interface and performs symbolic execution with the reconstruction expressions. This method is used to analyze the Lighttpd-1.4.29 and Linux kernel 3.4 systems. This method can greatly reduce the number of false positives. The number of false positives for Lighttpd-1.4.29 is reduced by 374, accounting for 67.3% of the total. The number of false positives for Linux kernel 3.4 is reduced by 159 761, accounting for 98.2% of the total. This system also successfully finds the CVE-2011-4362 and CVE-2013-1763 integer overflow vulnerabilities. ©, 2014, Press of Tsinghua University. All right reserved.
引用
收藏
相关论文
共 50 条
  • [1] ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
    Xu, Lili
    Xu, Mingjie
    Li, Feng
    Huo, Wei
    [J]. CYBERSECURITY, 2020, 3 (01)
  • [2] ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
    Lili Xu
    Mingjie Xu
    Feng Li
    Wei Huo
    [J]. Cybersecurity, 3
  • [3] Auditing buffer overflow vulnerabilities using hybrid static-dynamic analysis
    Padmanabhuni, Bindu Madhavi
    Tan, Hee Beng Kuan
    [J]. IET SOFTWARE, 2016, 10 (02) : 54 - 61
  • [4] Auditing Buffer Overflow Vulnerabilities using Hybrid Static-Dynamic Analysis
    Padmanabhuni, Bindu Madhavi
    Tan, Hee Beng Kuan
    [J]. 2014 IEEE 38TH ANNUAL INTERNATIONAL COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2014, : 394 - 399
  • [5] Mutation-based Testing of Integer Overflow Vulnerabilities
    Zeng, Fanping
    Mao, Liangliang
    Chen, Zhide
    Cao, Qing
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4416 - 4419
  • [6] Integer Overflow Vulnerabilities Detection in Software Binary Code
    Demidov, Roman
    Pechenkin, Alexander
    Zegzhda, Peter
    [J]. SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 101 - 106
  • [7] Detecting Integer Overflow Vulnerabilities in Binary Executables Based on Target Filtering and Dynamic Taint Tracing
    CUI Baojiang
    LIANG Xiaobing
    ZHAO Bing
    ZHAI Feng
    WANG Jianxin
    [J]. Chinese Journal of Electronics, 2014, 23 (02) : 348 - 352
  • [8] Detecting Integer Overflow Vulnerabilities in Binary Executables Based on Target Filtering and Dynamic Taint Tracing
    Cui Baojiang
    Liang Xiaobing
    Zhao Bing
    Zhai Feng
    Wang Jianxin
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (02) : 348 - 352
  • [10] Predicting Integer Overflow through Static Integer Operation Attributes
    Meng Qingkun
    Wen Shameng
    Feng Chao
    Tang Chaojing
    [J]. PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2016, : 177 - 181