A novel approach for analyzing buffer overflow vulnerabilities in binary executables by using machine learning techniques

被引:4
|
作者
Durmus, Gursoy [1 ]
Sogukpinar, Ibrahim [2 ]
机构
[1] HAVELSAN Naval Warfare Management Syst Technol Ct, TR-34890 Istanbul, Turkey
[2] Gebze Tech Univ, Dept Comp Engn, TR-41400 Kocaeli, Turkey
关键词
Software security; software vulnerability; machine learning; buffer overflow;
D O I
10.17341/gazimmfd.571485
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
While evaluating whether a software is secure or vulnerable with traditional methods; examination of security requirements, source code analysis and software security testing activities can be performed. In many cases, these activities cannot be performed by the end user due to not exist documentation of security related requirements, absence of source codes and need to expert security testing teams. When the software is in binary executable file format, we need expert systems, which accept just only binary executables as inputs to enable end-user side security analysis. In this study, we present a new method and its success, which is developed by using machine learning techniques to be used in the buffer overflow vulnerability analysis of binary executable formatted software applications.
引用
收藏
页码:1695 / 1704
页数:10
相关论文
共 50 条
  • [1] Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning
    Meng, Qingkun
    Feng, Chao
    Zhang, Bin
    Tang, Chaojing
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [2] The dynamic buffer overflow detection and prevention tool for Windows executables using binary rewriting
    Park, Seon-Ho
    Han, Young-Ju
    Hong, Soon-jwa
    Kim, Hyoung-Chun
    Chung, Tai-Myoung
    [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 1776 - 1781
  • [3] Buffer Overflow Vulnerability Prediction from x86 executables using Static Analysis and Machine Learning
    Padmanabhuni, Bindu Madhavi
    Tan, Hee Beng Kuan
    [J]. 39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2, 2015, : 450 - 459
  • [4] A Combinatorial Approach to Detecting Buffer Overflow Vulnerabilities
    Wang, Wenhua
    Lei, Yu
    Liu, Donggang
    Kung, David
    Csallner, Christoph
    Zhang, Dazhi
    Kacker, Raghu
    Kuhn, Rick
    [J]. 2011 IEEE/IFIP 41ST INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2011, : 269 - 278
  • [5] Detecting Integer Overflow Vulnerabilities in Binary Executables Based on Target Filtering and Dynamic Taint Tracing
    CUI Baojiang
    LIANG Xiaobing
    ZHAO Bing
    ZHAI Feng
    WANG Jianxin
    [J]. Chinese Journal of Electronics, 2014, 23 (02) : 348 - 352
  • [6] Detecting Integer Overflow Vulnerabilities in Binary Executables Based on Target Filtering and Dynamic Taint Tracing
    Cui Baojiang
    Liang Xiaobing
    Zhao Bing
    Zhai Feng
    Wang Jianxin
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (02) : 348 - 352
  • [8] A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning
    Ren, Jiadong
    Zheng, Zhangqi
    Liu, Qian
    Wei, Zhiyao
    Yan, Huaizhi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [9] Analysis of Software Vulnerabilities Using Machine Learning Techniques
    Diako, Doffou Jerome
    Achiepo, Odilon Yapo M.
    Mensah, Edoete Patrice
    [J]. E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES (AFRICOMM 2019), 2020, 311 : 30 - 37
  • [10] A Novel Approach for Fare Prediction Using Machine Learning Techniques
    Khandelwal, Kunal
    Sawarkar, Atharva
    Hira, Swati
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (05): : 602 - 609