Buffer Overflow Vulnerability Detection based on Format-Matching on Source Level

被引:0
|
作者
Wang, Xiaoyu [1 ]
Zhang, Zhao [1 ]
Wen, Qiaoyan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Network & Switching Technol, Beijing 100876, Peoples R China
关键词
buffer overflow; rule-based detection; dynamic test; format-matching;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Buffer overflow has become the most common software vulnerability, which seriously restricts the development of the software industry. It's very essential t o find out an effective method to detect this kind of software bugs accurately. In this paper, we design an improved buffer overflow detection system. At first, our system preprocesses the source code to add some auxiliary detection symbols. Then, it scans the source code by a static detector, which uses the identifier for auxiliary detection and combines with a dynamic detection method to improve the recognition accuracy and detection capability. Finally, we make a comparison between our system and the original detection system. To assess the usefulness of this approach, several experiments are performed on a simulation system, and we can draw a conclusion that our system performs better than other detection software. The method proposed in this paper is of the important application value and can improve detection accuracy.
引用
收藏
页码:298 / 301
页数:4
相关论文
共 50 条
  • [41] Software Source Code Vulnerability Detection Based on CNN-GAP Interpretability Model
    Wang Jian
    Kuang Hongyu
    Li Ruilin
    Su Yunfei
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (07) : 2568 - 2575
  • [42] A Slice-level vulnerability detection and interpretation method based on graph neural network
    Hu Y.-T.
    Wang S.-Y.
    Wu Y.-M.
    Zou D.-Q.
    Li W.-K.
    Jin H.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (06): : 2204 - 2221
  • [43] Firmware Vulnerability Detection Algorithm Based on Matching Pattern-Specific Numerical Features With Structural Features
    Liu, Peng
    Cao, Yasu
    Yan, Yujun
    Wang, Yong
    IEEE ACCESS, 2024, 12 : 42317 - 42328
  • [44] GuaNary: Efficient Buffer Overflow Detection In Virtualized Clouds Using Intel EPT-based Sub-PageWrite Protection Support
    Bitchebe, Stella
    Kone, Yves
    Olivier, Pierre
    Boukhobza, Jalil
    Bromberg, Yerom-David
    Hagimont, Daniel
    Tchana, Alain
    PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING SYSTEMS, 2023, 7 (03)
  • [45] A cosine similarity-based labeling technique for vulnerability type detection using source codes
    Ozturk, M. Maruf
    COMPUTERS & SECURITY, 2024, 146
  • [46] Tensor-based gated graph neural network for automatic vulnerability detection in source code
    Yang, Jia
    Ruan, Ou
    Zhang, JiXin
    SOFTWARE TESTING VERIFICATION & RELIABILITY, 2024, 34 (02):
  • [47] A vulnerability detection algorithm based on residual graph attention networks for source code imbalance (RGAN)
    Tang, Mingwei
    Tang, Wei
    Gui, Qingchi
    Hu, Jie
    Zhao, Mingfeng
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 238
  • [48] Interpretation of Learning-Based Automatic Source Code Vulnerability Detection Model Using LIME
    Tang, Gaigai
    Zhang, Long
    Yang, Feng
    Meng, Lianxiao
    Cao, Weipeng
    Qiu, Meikang
    Ren, Shuangyin
    Yang, Lin
    Wang, Huiqiang
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT III, 2021, 12817 : 275 - 286
  • [49] Research of image matching based on edge detection and gray level gradient distributing features
    Wen Jiangtao
    Wang Boxiong
    Luo Xiuzhi
    Jia Qianqian
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 1602 - 1604
  • [50] GuaNary: Efficient Buffer Overflow Detection in Virtualized Clouds Using Intel EPT-based Sub-Page Write Protection Support
    Bitchebe S.
    Kone Y.
    Olivier P.
    Boukhobza J.
    Bromberg Y.-D.
    Hagimont D.
    Tchana A.
    Performance Evaluation Review, 2024, 52 (01): : 65 - 66