首页> 外文期刊>Science of Computer Programming >Efficient static checker for tainted variable attacks
【24h】

Efficient static checker for tainted variable attacks

机译:高效的静态检查器,用于受污染的变量攻击

获取原文
获取原文并翻译 | 示例

摘要

Tainted flow attacks originate from program inputs maliciously crafted to exploit software vulnerabilities. These attacks are common in server-side scripting languages, such as PHP. In 1997, Orbaek and Palsberg formalized the problem of detecting these exploits as an instance of type-checking, and gave an O(V~3) algorithm to solve it. where V is the number of program variables. A similar algorithm was, ten years later, implemented on the Pixy tool. In this paper we give an O(V~2) solution to the same problem. Our solution uses Bodik et al.'s extended Static Single Assignment (e-SSA) program representation. The e-SSA form can be efficiently computed and it enables us to solve the problem via a sparse dataflow analysis. Using the same infrastructure, we compared a state-of-the-art dataflow solution with our technique. Both approaches have detected 36 vulnerabilities in well known PHP programs. Our results show that our approach tends to outperform the dataflow algorithm for larger inputs.
机译:恶意流攻击源自恶意设计为利用软件漏洞的程序输入。这些攻击在服务器端脚本语言(例如PHP)中很常见。 1997年,Orbaek和Palsberg正式将检测到这些漏洞的问题作为类型检查的一个实例,并给出了O(V〜3)算法来解决。其中V是程序变量的数量。十年后,在Pixy工具上实现了类似的算法。在本文中,我们针对同一问题给出了O(V〜2)解。我们的解决方案使用Bodik等人的扩展静态单项分配(e-SSA)程序表示形式。可以有效地计算e-SSA表格,这使我们能够通过稀疏数据流分析解决问题。使用相同的基础架构,我们将最新的数据流解决方案与我们的技术进行了比较。两种方法都在众所周知的PHP程序中检测到36个漏洞。我们的结果表明,对于较大的输入,我们的方法往往优于数据流算法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号