Buffer Overflow Vulnerability Detection based on Format-Matching on Source Level

被引:0
|
作者
Wang, Xiaoyu [1 ]
Zhang, Zhao [1 ]
Wen, Qiaoyan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Network & Switching Technol, Beijing 100876, Peoples R China
关键词
buffer overflow; rule-based detection; dynamic test; format-matching;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Buffer overflow has become the most common software vulnerability, which seriously restricts the development of the software industry. It's very essential t o find out an effective method to detect this kind of software bugs accurately. In this paper, we design an improved buffer overflow detection system. At first, our system preprocesses the source code to add some auxiliary detection symbols. Then, it scans the source code by a static detector, which uses the identifier for auxiliary detection and combines with a dynamic detection method to improve the recognition accuracy and detection capability. Finally, we make a comparison between our system and the original detection system. To assess the usefulness of this approach, several experiments are performed on a simulation system, and we can draw a conclusion that our system performs better than other detection software. The method proposed in this paper is of the important application value and can improve detection accuracy.
引用
收藏
页码:298 / 301
页数:4
相关论文
共 50 条
  • [1] PwnMaster: Automatic Buffer Overflow and Format String Vulnerability Detection and Exploitation
    Petrean, Florin
    Colesa, Adrian
    2024 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS, AQTR, 2024, : 105 - 109
  • [2] Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
    Akter, Mst. Shapna
    Shahriar, Hossain
    Cardenas, Juan Rodriguez
    Ahamed, Sheikh Iqbal
    Cuzzocrea, Alfredo
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 765 - 776
  • [3] BovdGFE: buffer overflow vulnerability detection based on graph feature extraction
    Xinghang Lv
    Tao Peng
    Jia Chen
    Junping Liu
    Xinrong Hu
    Ruhan He
    Minghua Jiang
    Wenli Cao
    Applied Intelligence, 2023, 53 : 15204 - 15221
  • [4] BovdGFE: buffer overflow vulnerability detection based on graph feature extraction
    Lv, Xinghang
    Peng, Tao
    Chen, Jia
    Liu, Junping
    Hu, Xinrong
    He, Ruhan
    Jiang, Minghua
    Cao, Wenli
    APPLIED INTELLIGENCE, 2023, 53 (12) : 15204 - 15221
  • [5] Rule-Based Source Level Patching of Buffer Overflow Vulnerabilities
    Shahriar, Hossain
    Haddad, Hisham M.
    PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2013, : 627 - 632
  • [6] A Detection Approach for Buffer Overflow Vulnerability Based on Data Control Flow Graph
    Chen, Jinfu
    Bao, Qihao
    Zhang, Qingchen
    Hu, Jinchang
    Kudjo, Patrick Kwaku
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 310 - 324
  • [7] A static comprehensive analytical method for buffer overflow vulnerability detection
    Shao Bilin
    Yan Jiafen
    Bian Genqing
    Zhao Yu
    Song Dan
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2016, 48 : 151 - 155
  • [8] An Analysis Model of Buffer Overflow Vulnerability Based on FSM
    Jie, Liu
    Da, He
    Rao Zhihong
    2019 2ND INTERNATIONAL CONFERENCE ON GEOINFORMATICS AND DATA ANALYSIS (ICGDA 2019), 2019, : 47 - 51
  • [9] Analysis of Signature and Signature Free Buffer-overflow detection for gif and jpg format
    Pawar, Pankaj B.
    Nagle, Malti
    Kawadkar, Pankaj K.
    Ambare, Padmashree Kunthe
    2013 TENTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2013,
  • [10] Survey of Attacks and Defenses on Stack-based Buffer Overflow Vulnerability
    Wang, Wei
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, INFORMATION AND COMPUTER SCIENCE (ICEMC 2017), 2017, 73 : 324 - 328