Auditing buffer overflow vulnerabilities using hybrid static-dynamic analysis

被引:7
|
作者
Padmanabhuni, Bindu Madhavi [1 ]
Tan, Hee Beng Kuan [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, 50 Nanyang Ave, Singapore 639798, Singapore
关键词
buffer storage; program diagnostics; learning (artificial intelligence); auditing; data mining; program debugging; security of data; buffer overflow vulnerability auditing; hybrid static-dynamic analysis; security objective; dynamic program analysis; static program analysis; machine learning; BOF auditing; static code attribute mining; bugs;
D O I
10.1049/iet-sen.2014.0185
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Buffer overflow (BOF) vulnerabilities when present in code can be exploited to violate security objectives such as availability, confidentiality and integrity. They make up substantial portion of input manipulation attacks due to their common presence and ease of exploitation. In this study, the authors propose a hybrid approach combining static and dynamic program analysis with machine learning to audit BOFs. Simple rules to generate test data is proposed to confirm some of the vulnerabilities through dynamic analysis. Confirmed cases can be fixed by developers without further verification. Statements whose vulnerability is not confirmed by dynamic analysis are predicted by mining static code attributes. In the authors' evaluation using standard benchmarks, their best classifier achieved a recall over 93% and accuracy >94%. Dynamic analysis itself confirmed 34% of known vulnerabilities along with reporting six new bugs, thereby reducing by third, otherwise needed manual auditing effort.
引用
收藏
页码:54 / 61
页数:8
相关论文
共 50 条
  • [31] A novel approach for analyzing buffer overflow vulnerabilities in binary executables by using machine learning techniques
    Durmus, Gursoy
    Sogukpinar, Ibrahim
    [J]. JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2019, 34 (04): : 1695 - 1704
  • [32] Fault Localization Using Hybrid Static/Dynamic Analysis
    Elsaka, E.
    [J]. ADVANCES IN COMPUTERS, VOL 105, 2017, 105 : 79 - 114
  • [33] Hybrid Static-Dynamic Modeling and Experimental Analysis of Multi-Scale Complex Environments: Application to Ubiquitous Interactions
    Wane, Sidina
    Bajon, Damienne
    Russer, Johannes
    Gradoni, Gabriele
    Descamps, Philippe
    Russer, Peter
    [J]. 2018 2ND URSI ATLANTIC RADIO SCIENCE MEETING (AT-RASC), 2018,
  • [34] Variational principles on static-dynamic analysis of viscoelastic thin plates with applications
    Cheng, CJ
    Zhang, NH
    [J]. INTERNATIONAL JOURNAL OF SOLIDS AND STRUCTURES, 1998, 35 (33) : 4491 - 4505
  • [35] Static-Dynamic Analysis of A Lower Limb Exoskeleton Controlled by a Fuzzy PD
    Calle Arevalo, Luis
    Chacon Jaramillo, Paul
    Amaya Pinos, Marco
    Zambrano Abad, Julio
    Avila Campoverde, Rene
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON REAL-TIME COMPUTING AND ROBOTICS (RCAR), 2017, : 392 - 397
  • [36] Hybrid Static-dynamic Sensation Electrotactile Feedback for Hand Prosthesis Tactile and Proprioception Feedback
    Yang, Bin
    Jiang, Li
    [J]. JOURNAL OF BIONIC ENGINEERING, 2023, 20 (01) : 267 - 277
  • [37] Load-balancing scheduling of simulation tasks based on a static-dynamic hybrid algorithm
    Wang, Xiashuang
    Li, Ni
    Gong, Guanghong
    Song, Xiao
    Guo, Yanqi
    [J]. JOURNAL OF SIMULATION, 2022, 16 (02) : 182 - 193
  • [38] Hybrid Static-dynamic Sensation Electrotactile Feedback for Hand Prosthesis Tactile and Proprioception Feedback
    Bin Yang
    Li Jiang
    [J]. Journal of Bionic Engineering, 2023, 20 : 267 - 277
  • [39] Buffer Overflow Vulnerability Prediction from x86 executables using Static Analysis and Machine Learning
    Padmanabhuni, Bindu Madhavi
    Tan, Hee Beng Kuan
    [J]. 39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2, 2015, : 450 - 459
  • [40] Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat
    Zhang, Chao
    Zou, Wei
    Wang, Tielei
    Chen, Yu
    Wei, Tao
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (06) : 1083 - 1107