【24h】

A Comprehensive Detection of Memory Corruption Vulnerabilities for C/C++ Programs

机译:全面检测C / C ++程序的内存损坏漏洞

获取原文
获取原文并翻译 | 示例

摘要

Memory corruption bugs in software written in low-level languages like C or C++ are one of the oldest problems in computer security. These unsafe languages are vulnerable to errors relating to the misuse of memory, such as buffer overflows, use-after-free. The exploit of these vulnerabilities allows attackers to tamper or even take full control over the program. In this paper, we propose a lightweight and comprehensive vulnerability detection approach for memory corruption defects in programs written in C or C++. The approach is based on identification of the unsafe operations in source code, including both invalid memory writes and reads. Supporting by flow-sensitive point-to analysis with LLVM and Datalog, and extracted information from abstract syntax tree, our method can analyze the potential memory corruption vulnerabilities in the source code. We evaluate our approach against the SPEC 2006 benchmark suite and Juliet test suite. We also show that the approach achieves high compatibility and reasonable overheads for detection.
机译:用低级语言(例如C或C ++)编写的软件中的内存损坏错误是计算机安全性中最古老的问题之一。这些不安全的语言容易受到与内存滥用有关的错误的影响,例如缓冲区溢出,无用后使用。利用这些漏洞,攻击者可以篡改甚至完全控制该程序。在本文中,我们针对使用C或C ++编写的程序中的内存损坏缺陷提出了一种轻量级且全面的漏洞检测方法。该方法基于识别源代码中的不安全操作,包括无效的内存写入和读取。通过使用LLVM和Datalog进行流敏感的指向分析,并从抽象语法树中提取信息,我们的方法可以分析源代码中潜在的内存损坏漏洞。我们根据SPEC 2006基准套件和Juliet测试套件评估了我们的方法。我们还表明,该方法实现了高度的兼容性和合理的检测开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号