An Efficient Metric-Based Approach for Static Use-After-Free Detection

被引:0
|
作者
Wei, Haolai [1 ]
Chen, Liwei [1 ]
Nie, Xiaofan [1 ]
Zhang, Zhijie [1 ]
Zhang, Yuantong [1 ]
Shi, Gang [1 ]
机构
[1] Univ Chinese Acad Sci, Sch Cyber Secur, Inst Informat Engn, Chinese Acad Sci, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
use-after-free; vulnerability; static analysis; program metric;
D O I
10.1109/ISPA-BDCloud-SocialCom-SustainCom57177.2022.00015
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, attackers are increasingly using Use-After-Free(UAF) vulnerabilities to create threats against software security. Existing static approaches for UAF detection are capable of finding potential bugs in the large code base. In most cases, analysts perform manual inspections to verify whether the warnings detected by static analysis are real vulnerabilities. However, due to the complex constraints of constructing UAF vulnerability, it is very time and cost-intensive to screen all warnings. In fact, many warnings should be discarded before the manual inspection phase because they are almost impossible to get triggered in real-world, and it is often overlooked by current static analysis techniques. In this paper, we introduce a metric-based static analysis approach, named MAD, for efficiently identifying UAF vulnerabilities by removing redundant warnings. We design two sets of systematic metrics to drive MAD. First, we apply lightweight static analysis to locate potential UAF pairs and use Feature Metrics to gather their feature information into an evaluation pool. Then, we use Controllability Metrics to rank the evaluation pools and filter out the high ones as candidates for subsequent manual inspection. We have implemented MAD and evaluated it using Juliet Test Suite and a set of eight open-source C programs. MAD can locate all UAF bugs in Juliet Test Suite within a recognizable range, showing effectiveness and scalability by detecting 5 known CVEs with 1,286 KLOC in just 1.6 hours. Furthermore, we can achieve an average 75% reduction rate for reported warnings and save about half the time in locating UAF vulnerabilities during manual inspection.
引用
收藏
页码:58 / 65
页数:8
相关论文
共 50 条
  • [31] Automated Use-After-Free Detection and Exploit Mitigation: How Far Have We Gone?
    Gui, Binfa
    Song, Wei
    Xiong, Hailong
    Huang, Jeff
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (11) : 4569 - 4589
  • [32] Preventing Use-After-Free Attacks with Fast Forward Allocation
    Wickman, Brian
    Hu, Hong
    Yun, Insu
    Jang, Daehee
    Lim, JungWon
    Kashyap, Sanidhya
    Kim, Taesoo
    [J]. PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2453 - 2470
  • [33] A metric-based approach for predicting conceptual data models maintainability
    Piattini, M
    Genero, M
    Jiménez, L
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2001, 11 (06) : 703 - 729
  • [34] FREEWILL: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries
    He, Liang
    Hu, Hong
    Su, Purui
    Cai, Yan
    Liang, Zhenkai
    [J]. PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 2497 - 2512
  • [35] Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers
    Qiang, Weizhong
    Li, Weifeng
    Jin, Hai
    Surbiryala, Jayachander
    [J]. IEEE ACCESS, 2019, 7 : 45961 - 45977
  • [36] Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services
    Gruss, Daniel
    Schwarz, Michael
    Wuebbeling, Matthias
    Guggi, Simon
    Malderle, Timo
    More, Stefan
    Lipp, Moritz
    [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 297 - 311
  • [37] Use-After-Free Mitigation via Protected Heap Allocation
    Zhang, Mingbo
    Zonouz, Saman
    [J]. 2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 131 - 138
  • [38] Detecting use-after-free bugs in embedded C programs
    Wang Y.
    Li X.
    Wu G.
    Tang S.
    Zhu Y.
    Dong T.
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (01): : 124 - 132and148
  • [39] Metric-based software reliability prediction approach and its application
    Ying Shi
    Ming Li
    Steven Arndt
    Carol Smidts
    [J]. Empirical Software Engineering, 2017, 22 : 1579 - 1633
  • [40] Metric-based software reliability prediction approach and its application
    Shi, Ying
    Li, Ming
    Arndt, Steven
    Smidts, Carol
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2017, 22 (04) : 1579 - 1633