Memory Corruption Vulnerabilities Detection for Android Binary Software

被引:0
|
作者
Zhang, Bin [1 ]
Wu, Bo [1 ]
Feng, Chao [1 ]
Tang, Chaojing [1 ]
机构
[1] Natl Univ Def Technol, Sch Elect Sci & Engn, Changsha, Hunan, Peoples R China
来源
2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC) | 2015年
关键词
Memory corruption vulnerability; Selective symbolic execution; Android binary software;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The vulnerabilities exist in Android binary software bring critical threat to Mobile Internet security. In this paper, we put forward a novel method to detect memory corruption vulnerabilities for Android binary software which builds upon memory accession security rules and selective symbolic execution. We also implemented our prototype system and the evaluation results show that our method can detect the memory corruption vulnerabilities in Android binary software effectively and accurately.
引用
收藏
页码:16 / 20
页数:5
相关论文
共 50 条
  • [11] Static Detection of Filesystem Vulnerabilities in Android Systems
    Lee, Yu-Tsung
    Vijayakumar, Hayawardh
    Qian, Zhiyun
    Jaeger, Trent
    arXiv,
  • [12] Messaging Attacks on Android: Vulnerabilities and Intrusion Detection
    Hamandi, Khodor
    Salman, Alaa
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [13] When Memory Corruption Met Concurrency: Vulnerabilities in Concurrent Programs
    Llorente-Vazquez, Oscar
    Santos-Grueiro, Igor
    Bringas, Pablo Garcia
    IEEE ACCESS, 2023, 11 : 44725 - 44740
  • [14] TEEREX: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves
    Cloosters, Tobias
    Rodler, Michael
    Davi, Lucas
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 841 - 858
  • [15] On the Detection and Analysis of Software Security Vulnerabilities
    Wijesiriwardana, Chaman
    Wimalaratne, Prasad
    2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [16] Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones
    Han, Zhihui
    Cheng, Liang
    Zhang, Yang
    Zeng, Shuke
    Deng, Yi
    Sun, Xiaoshan
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 432 - 439
  • [17] Assessing Vulnerabilities to Corruption
    Johnston, Michael
    PUBLIC INTEGRITY, 2010, 12 (02) : 125 - 142
  • [18] Profiling Android Vulnerabilities
    Jimenez, Matthieu
    Papadakis, Mike
    Bissyande, Tegawende F.
    Klein, Jacques
    2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2016), 2016, : 222 - 229
  • [19] Android Vulnerabilities and Security
    Yadav, Saurav
    Apurva, Aviral
    Ranakoti, Pranshu
    Tomer, Shashank
    Roy, Nihar Ranjan
    2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 204 - 208
  • [20] Statically Detect Invalid Pointer Dereference Vulnerabilities in Binary Software
    Zhang, Bin
    Wu, Bo
    ChaoFeng
    Zhang, Xing
    Tang, Chaojing
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATCS AND COMPUTING (IEEE PIC), 2015, : 390 - 394