Buffer Overflow Vulnerability Detection based on Format-Matching on Source Level

被引:0
|
作者
Wang, Xiaoyu [1 ]
Zhang, Zhao [1 ]
Wen, Qiaoyan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Network & Switching Technol, Beijing 100876, Peoples R China
关键词
buffer overflow; rule-based detection; dynamic test; format-matching;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Buffer overflow has become the most common software vulnerability, which seriously restricts the development of the software industry. It's very essential t o find out an effective method to detect this kind of software bugs accurately. In this paper, we design an improved buffer overflow detection system. At first, our system preprocesses the source code to add some auxiliary detection symbols. Then, it scans the source code by a static detector, which uses the identifier for auxiliary detection and combines with a dynamic detection method to improve the recognition accuracy and detection capability. Finally, we make a comparison between our system and the original detection system. To assess the usefulness of this approach, several experiments are performed on a simulation system, and we can draw a conclusion that our system performs better than other detection software. The method proposed in this paper is of the important application value and can improve detection accuracy.
引用
收藏
页码:298 / 301
页数:4
相关论文
共 50 条
  • [31] Open source software security vulnerability detection based on dynamic behavior features
    Li, Yuancheng
    Ma, Longqiang
    Shen, Liang
    Lv, Junfeng
    Zhang, Pan
    PLOS ONE, 2019, 14 (08):
  • [32] VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer
    Yang, Hongyu
    Yang, Haiyun
    Zhang, Liang
    CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 217 - 224
  • [33] An Empirical Study on Vulnerability Detection for Source Code Software based on Deep Learning
    Lin, Wei
    Cai, Saihua
    2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 1159 - 1160
  • [34] Source Code Vulnerability Detection Based on Residual Gated Graph Convolutional Networks
    Zhang, Jun
    Li, Shanshan
    Li, Lei
    Wang, Haoyu
    Computer Engineering and Applications, 2023, 59 (22) : 293 - 299
  • [35] Slice-level vulnerability detection model based on graph neural network
    Ren, Jiadong
    Zhang, Jiao
    Li, Jiazheng
    Yang, Shuailin
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 52 - 57
  • [36] Binary Code Vulnerability Detection Based on Multi-Level Feature Fusion
    Wu, Guangli
    Tang, Huili
    IEEE ACCESS, 2023, 11 : 63904 - 63915
  • [37] The Source Code Plagiarism Detection based on Function Sub-string Matching
    Xiao JingZhong
    Xiao Li
    2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 1, 2011, : 397 - 400
  • [38] Sound Source Localization Indoors Based on Two-Level Reference Points Matching
    Wang, Shuopeng
    Yang, Peng
    Sun, Hao
    APPLIED SCIENCES-BASEL, 2022, 12 (19):
  • [39] Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models
    Senanayake, Janaka
    Kalutarage, Harsha
    Al-Kadri, Mhd Omar
    Piras, Luca
    Petrovski, Andrei
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 659 - 666
  • [40] DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection
    Chen, Yizheng
    Ding, Zhoujie
    Alowain, Lamya
    Chen, Xinyun
    Wagner, David
    PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 654 - 668