首页> 外文会议>2011 IEEE/IFIP 41st International Conference on Dependable Systems Networks >A combinatorial approach to detecting buffer overflow vulnerabilities
【24h】

A combinatorial approach to detecting buffer overflow vulnerabilities

机译:一种检测缓冲区溢出漏洞的组合方法

获取原文

摘要

Buffer overflow vulnerabilities are program defects that can cause a buffer to overflow at runtime. Many security attacks exploit buffer overflow vulnerabilities to compromise critical data structures. In this paper, we present a black-box testing approach to detecting buffer overflow vulnerabilities. Our approach is motivated by a reflection on how buffer overflow vulnerabilities are exploited in practice. In most cases the attacker can influence the behavior of a target system only by controlling its external parameters. Therefore, launching a successful attack often amounts to a clever way of tweaking the values of external parameters. We simulate the process performed by the attacker, but in a more systematic manner. A novel aspect of our approach is that it adapts a general software testing technique called combinatorial testing to the domain of security testing. In particular, our approach exploits the fact that combinatorial testing often achieves a high level of code coverage. We have implemented our approach in a prototype tool called Tance. The results of applying Tance to five open-source programs show that our approach can be very effective in detecting buffer overflow vulnerabilities.
机译:缓冲区溢出漏洞是程序缺陷,可能导致缓冲区在运行时溢出。许多安全攻击利用缓冲区溢出漏洞来破坏关键数据结构。在本文中,我们提出了一种黑盒测试方法来检测缓冲区溢出漏洞。我们的方法是反思在实践中如何利用缓冲区溢出漏洞。在大多数情况下,攻击者只能通过控制目标系统的外部参数来影响目标系统的行为。因此,发起一次成功的攻击通常是一种调整外部参数值的巧妙方法。我们以更系统的方式模拟攻击者执行的过程。我们的方法的一个新颖方面是,它将一种称为组合测试的通用软件测试技术适应了安全性测试的领域。特别是,我们的方法利用了组合测试通常可以达到较高代码覆盖率这一事实。我们已经在名为Tance的原型工具中实现了我们的方法。将Tance应用于五个开源程序的结果表明,我们的方法可以非常有效地检测缓冲区溢出漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号