首页> 外文会议>Information Technology, Networking, Electronic and Automation Control Conference >Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis
【24h】

Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis

机译:通过自动静态分析检测智能电网设备中的缓冲区溢出漏洞

获取原文

摘要

As a modern power transmission network, smart grid connects plenty of terminal devices. However, along with the growth of devices are the security threats. Different from the previous separated environment, an adversary nowadays can destroy the power system by attacking these devices. Therefore, it's critical to ensure the security and safety of terminal devices. To achieve this goal, detecting the pre-existing vulnerabilities of the device program and enhance the terminal security, are of great importance and necessity. In this paper, we propose a novel approach that detects existing buffer-overflow vulnerabilities of terminal devices via automatic static analysis (ASA). We utilize the static analysis to extract the device program information and build corresponding program models. By further matching the generated program model with pre-defined vulnerability patterns, we achieve vulnerability detection and error reporting. The evaluation results demonstrate that our method can effectively detect buffer-overflow vulnerabilities of smart terminals with a high accuracy and a low false positive rate.
机译:作为现代电力传输网络,智能电网可连接大量终端设备。但是,随着设备的增长,安全性受到威胁。与以前的分离环境不同,如今的对手可以通过攻击这些设备来破坏电力系统。因此,确保终端设备的安全性至关重要。为了实现这个目标,检测设备程序中预先存在的漏洞并增强终端安全性是非常重要和必要的。在本文中,我们提出了一种新颖的方法,该方法通过自动静态分析(ASA)检测终端设备的现有缓冲区溢出漏洞。我们利用静态分析来提取设备程序信息并建立相应的程序模型。通过进一步将生成的程序模型与预定义的漏洞模式进行匹配,我们可以实现漏洞检测和错误报告。评估结果表明,该方法能够以较高的准确度和较低的误报率有效检测智能终端的缓冲区溢出漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号