Memory Corruption Vulnerabilities Detection for Android Binary Software

被引:0
|
作者
Zhang, Bin [1 ]
Wu, Bo [1 ]
Feng, Chao [1 ]
Tang, Chaojing [1 ]
机构
[1] Natl Univ Def Technol, Sch Elect Sci & Engn, Changsha, Hunan, Peoples R China
来源
2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC) | 2015年
关键词
Memory corruption vulnerability; Selective symbolic execution; Android binary software;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The vulnerabilities exist in Android binary software bring critical threat to Mobile Internet security. In this paper, we put forward a novel method to detect memory corruption vulnerabilities for Android binary software which builds upon memory accession security rules and selective symbolic execution. We also implemented our prototype system and the evaluation results show that our method can detect the memory corruption vulnerabilities in Android binary software effectively and accurately.
引用
收藏
页码:16 / 20
页数:5
相关论文
共 50 条
  • [31] ANN Modelling on Vulnerabilities Detection in Code Smells-Associated Android Applications
    Gupta, Aakanshi
    Sharma, Deepanshu
    Phulli, Kritika
    FOUNDATIONS OF COMPUTING AND DECISION SCIENCES, 2022, 47 (01) : 3 - 26
  • [32] Deep Learning Based Android Anomaly Detection Using a Combination of Vulnerabilities Dataset
    Namrud, Zakeya
    Kpodjedo, Segla
    Talhi, Chamseddine
    Bali, Ahmed
    Belle, Alvine Boaye
    APPLIED SCIENCES-BASEL, 2021, 11 (16):
  • [33] Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software
    Hu, Hong
    Chua, Zheng Leong
    Liang, Zhenkai
    Saxena, Prateek
    COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 312 - 331
  • [34] DeepDiver: Diving into Abysmal Depth of the Binary for Hunting Deeply Hidden Software Vulnerabilities
    Rustamov, Fayozbek
    Kim, Juhwan
    Yun, JooBeom
    FUTURE INTERNET, 2020, 12 (04):
  • [35] Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware
    Shoshitaishvili, Yan
    Wang, Ruoyu
    Hauser, Christophe
    Kruegel, Christopher
    Vigna, Giovanni
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [36] Detection and Mitigation of Vulnerabilities in Space Network Software Bus Architectures
    Schalk, Adrian
    Brown, Dane
    2023 IEEE AEROSPACE CONFERENCE, 2023,
  • [37] Deep Learning for Software Vulnerabilities Detection Using Code Metrics
    Zagane, Mohammed
    Abdi, Mustapha Kamel
    Alenezi, Mamdouh
    IEEE ACCESS, 2020, 8 : 74562 - 74570
  • [38] A Configurable Software Aging Detection and Rejuvenation Agent for Android
    Cotroneo, Domenico
    De Simone, Luigi
    Natella, Roberto
    Pietrantuono, Roberto
    Russo, Stefano
    2019 IEEE 30TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2019), 2019, : 239 - 245
  • [39] Fuzzing: A solution chosen by the FDA to investigate detection of software vulnerabilities
    Baker, Steven D.
    Biomedical Instrumentation and Technology, 2014, 48 (HORIZONS SPRING): : 42 - 47
  • [40] Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection
    Pechenkin, Alexander
    Demidov, Roman
    11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,