首页> 外文会议>IEEE international conference on computer science and information technology >A Method of Detecting Stack Overflow Vulnerability of Binary Code of a Component
【24h】

A Method of Detecting Stack Overflow Vulnerability of Binary Code of a Component

机译:一种检测组件二进制代码堆栈溢出漏洞的方法

获取原文

摘要

Security testing of COM components is a hot yet difficult field in recent years. There are only a few methods of detecting stack overflow vulnerability of a component. This paper presents a method of detecting stack overflow vulnerability of binary code of a component. The method converts the buffer overflow problem into the problem of integer constraints. By scanning the different buffers according to the types of risk function parameters, it first establishes a function library of all risks of.COM component, and then compares the used buffer size and the declared buffer size to identify the stack overflow vulnerability. The result of the experiment shows that the proposed method has desirable results of detecting COM components' stack overflow vulnerability.
机译:近年来,COM组件的安全性测试是一个热门而又困难的领域。只有很少的方法可以检测组件的堆栈溢出漏洞。本文提出了一种检测组件二进制代码堆栈溢出漏洞的方法。该方法将缓冲区溢出问题转换为整数约束问题。通过根据风险函数参数的类型扫描不同的缓冲区,它首先建立了一个.COM组件的所有风险的函数库,然后将使用的缓冲区大小和声明的缓冲区大小进行比较,以识别堆栈溢出漏洞。实验结果表明,该方法具有检测COM组件堆栈溢出漏洞的良好效果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号