首页> 外文会议>Annual network and distributed system security symposium >IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution
【24h】

IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution

机译:INTSCOPE:使用符号执行,自动检测X86二进制二进制中的整数溢出漏洞

获取原文

摘要

The number of identified integer overflow vulnerabilities has been increasing rapidly in recent years. In this paper, we present a system, IntScope, which can automatically detect integer overflow vulnerabilities in x86 binaries before an attacker does, with the goal of finally eliminating the vulnerabilities. IntScope first translates the disassembled code into our own intermediate representation (IR), and then performs a path sensitive data flow analysis on the IR by leveraging symbolic execution and taint analysis to identify the vulnerable point of integer overflow. Compared with other approaches, IntScope does not run the binary directly, and is scalable to large software as it can just symbolically execute the interesting program paths. Experimental results show IntScope is quite encouraging: it has detected more than 20 zero-day integer overflows (e.g., CVE-2008-4201, FrSIRT/ADV-2008-2919) in widely-used software such as QEMU, Xen and Xine.
机译:近年来,所识别的整数溢出漏洞的数量一直在迅速增加。在本文中,我们展示了一个系统,IntScope,它可以在攻击者确实之前自动检测x86二进制文件中的整数溢出漏洞,其目标最终消除了漏洞。 INTSCOPE首先将拆卸的代码转换为我们自己的中间表示(IR),然后通过利用符号执行和Taint分析来识别整数溢出的易受攻击点来对IR执行路径敏感数据流分析。与其他方法相比,INTSCOPE不会直接运行二进制,并且可以扩展到大型软件,因为它可以象征性地执行有趣的程序路径。实验结果表明Intscope非常令人鼓舞:它已在广泛使用的软件中检测到超过20个零整数溢出(例如,CVE-2008-4201,FRSIRT / ADV-2008-2919),如QEMU,Xen和Xine。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号