【24h】

A New Detection Method for Stack Overflow Vulnerability Based on Component Binary Code for Third-Party Component

机译:基于第三方组件的组件二进制代码的堆栈溢出漏洞检测新方法

获取原文

摘要

Security testing of Component Object Model (COM) is an active area of research in the software engineering community. This is partly due to the increase in security related issues (referred to as vulnerabilities) reported by users. Although many papers have been published on Component Object Model, very little attention has been paid to the detection of stack overflow vulnerability in software component. This paper presents a method to detect stack overflow vulnerability of binary code of a component. We first convert the buffer overflow problem as an integer constraints problem. We then scan the different buffers according to the types of risk function parameters to establish a function library for all the risks COM components. Finally, we compare the used buffer size and the declared buffer size to identify the stack overflow vulnerability. The experimental result shows that the proposed method is capable of detecting COM components' stack overflow vulnerability. The introduced SBOD (stack buffer overflow detection) algorithm is a promising direction to assist software engineers who seek to detect stack overflow vulnerability in order to improve software quality.
机译:组件对象模型(COM)的安全性测试是软件工程界研究的一个活跃领域。部分原因是用户报告的与安全相关的问题(称为漏洞)增加。尽管已经有很多关于组件对象模型的论文,但是很少关注软件组件中堆栈溢出漏洞的检测。本文提出了一种检测组件二进制代码堆栈溢出漏洞的方法。我们首先将缓冲区溢出问题转换为整数约束问题。然后,我们根据风险函数参数的类型扫描不同的缓冲区,以建立所有风险COM组件的函数库。最后,我们将使用的缓冲区大小与声明的缓冲区大小进行比较,以识别堆栈溢出漏洞。实验结果表明,该方法能够检测COM组件的堆栈溢出漏洞。引入的SBOD(堆栈缓冲区溢出检测)算法是一个有前途的方向,可以协助寻求检测堆栈溢出漏洞以提高软件质量的软件工程师。

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号