【24h】

Classification of Static Analysis-Based Buffer Overflow Detectors

机译:基于静态分析的缓冲区溢出检测器的分类

获取原文
获取外文期刊封面目录资料

摘要

Buffer overflow is one of the most dangerous exploitable vulnerabilities in released software or programs. Many approaches are applied to mitigate buffer overflow (BOF) vulnerabilities such as testing and monitoring. However, BOF vulnerabilities are discovered in programs frequently which might be exploited to crash programs and execute arbitrary injected code. Static analysis is a popular approach for detecting BOF vulnerabilities before releasing programs. Many static analysis-based approaches are currently used in practice. However, there is no detailed classification of these approaches to understand their common characteristics, objectives, and limitations. In this paper, we classify static analysis-based BOF vulnerability detection approaches based on six features: inference technique, analysis sensitivity, analysis granularity, soundness, completeness, and language. We then classify static inference techniques into four types: tainted data flow, constraint, annotation, and string pattern matching. Moreover, we compare the approaches in terms of effectiveness, scalability, and required manual effort. The classification will enable researchers to differentiate among existing analysis approaches. We develop some guidelines to help in choosing approaches and building tools suitable for practitioners need.
机译:缓冲区溢出是发布软件或程序中最危险的可利用漏洞之一。许多方法应用于缓解缓冲区溢出(BOF)漏洞,例如测试和监控。但是,BOF漏洞在经常被利用以崩溃程序并执行任意注入代码中的程序中发现。静态分析是一种流行的方法,可以在释放程序之前检测BOF漏洞。目前正在实践中使用许多基于静态分析的方法。但是,没有详细分类这些方法,以了解他们的共同特征,目标和局限性。在本文中,我们根据六个特征对基于静态分析的BOF漏洞检测方法进行分类:推理技术,分析灵敏度,分析粒度,声音,完整性和语言。然后,我们将静态推理技术分为四种类型:受污染的数据流,约束,注释和字符串模式匹配。此外,我们在有效性,可扩展性和所需的手动努力方面进行比较方法。分类将使研究人员能够区分现有的分析方法。我们制定一些指导方针,以帮助选择适合从业者需要的方法和建筑工具。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号