Buffer Overflow Vulnerability Detection based on Format-Matching on Source Level

被引:0
|
作者
Wang, Xiaoyu [1 ]
Zhang, Zhao [1 ]
Wen, Qiaoyan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Network & Switching Technol, Beijing 100876, Peoples R China
关键词
buffer overflow; rule-based detection; dynamic test; format-matching;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Buffer overflow has become the most common software vulnerability, which seriously restricts the development of the software industry. It's very essential t o find out an effective method to detect this kind of software bugs accurately. In this paper, we design an improved buffer overflow detection system. At first, our system preprocesses the source code to add some auxiliary detection symbols. Then, it scans the source code by a static detector, which uses the identifier for auxiliary detection and combines with a dynamic detection method to improve the recognition accuracy and detection capability. Finally, we make a comparison between our system and the original detection system. To assess the usefulness of this approach, several experiments are performed on a simulation system, and we can draw a conclusion that our system performs better than other detection software. The method proposed in this paper is of the important application value and can improve detection accuracy.
引用
收藏
页码:298 / 301
页数:4
相关论文
共 50 条
  • [21] The Study on Integer Overflow Vulnerability Detection in Binary Executables Based Upon Genetic Algorithm
    Cui, Baojiang
    Liang, Xiaobing
    Wang, Jianxin
    FOUNDATIONS OF INTELLIGENT SYSTEMS (ISKE 2011), 2011, 122 : 259 - +
  • [22] A Highly Automated Binary Software Vulnerability Risk Evaluation Method For Off-by-one Stack Based Buffer Overflow
    Yan, Ke
    Liu, Dong
    Meng, Fanzhi
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 16 - 20
  • [23] A buffer overflow detection and defense method based on RISC-V instruction set extension
    Chang Liu
    Yan-Jun Wu
    Jing-Zheng Wu
    Chen Zhao
    Cybersecurity, 6
  • [24] A buffer overflow detection and defense method based on RISC-V instruction set extension
    Liu, Chang
    Wu, Yan-Jun
    Wu, Jing-Zheng
    Zhao, Chen
    CYBERSECURITY, 2023, 6 (01)
  • [25] An Automatic Source Code Vulnerability Detection Approach Based on KELM
    Tang, Gaigai
    Yang, Lin
    Ren, Shuangyin
    Meng, Lianxiao
    Yang, Feng
    Wang, Huiqiang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [26] Object detection based on two level fast matching
    Dou, Yumin
    Ye, Mao
    Xu, Pei
    Pei, Lishen
    Liu, Zhenghua
    International Journal of Multimedia and Ubiquitous Engineering, 2015, 10 (12): : 381 - 394
  • [27] A multitype software buffer overflow vulnerability prediction method based on a software graph structure and a self-attentive graph neural network
    Zheng, Zhangqi
    Liu, Yongshan
    Zhang, Bing
    Liu, Xinqian
    He, Hongyan
    Gong, Xiang
    INFORMATION AND SOFTWARE TECHNOLOGY, 2023, 160
  • [28] Research and Progress on Learning-Based Source Code Vulnerability Detection
    Su X.-H.
    Zheng W.-N.
    Jiang Y.
    Wei H.-W.
    Wan J.-Y.
    Wei Z.-Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (02): : 337 - 374
  • [29] A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code
    Li, Xingzheng
    Feng, Bingwen
    Li, Guofeng
    Li, Tong
    He, Mingjin
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [30] Source Code Vulnerability Detection Based on Joint Graph and Multimodal Feature Fusion
    Jin, Dun
    He, Chengwan
    Zou, Quan
    Qin, Yan
    Wang, Boshu
    ELECTRONICS, 2025, 14 (05):