期刊文献+

Method of integer overflow detection to avoid buffer overflow 被引量:3

一种防止缓冲区溢出的整数溢出检测方法(英文)
下载PDF
导出
摘要 A simplified integer overflow detection method based on path relaxation is described for avoiding buffer overflow triggered by integer overflow. When the integer overflow refers to the size of the buffer allocated dynamically, this kind of integer overflow is most likely to trigger buffer overflow. Based on this discovery, through lightly static program analysis, the solution traces the key variables referring to the size of a buffer allocated dynamically and it maintains the upper bound and lower bound of these variables. After the constraint information of these traced variables is inserted into the original program, this method tests the program with test cases through path relaxation, which means that it not only reports the errors revealed by the current runtime value of traced variables contained in the test case, but it also examines the errors possibly occurring under the same execution path with all the possible values of the traced variables. The effectiveness of this method is demonstrated in a case study. Compared with the traditional buffer overflow detection methods, this method reduces the burden of detection and improves efficiency. 为了防止由整数溢出引起的缓冲区溢出,提出了一种简化的基于路径松弛的整数溢出检测方法.表示动态分配缓冲区大小的整型变量发生溢出,极有可能引发缓冲区溢出.该检测方法基于这一发现,在动态测试之前先进行轻量级的静态分析,跟踪与动态分配缓冲区大小相关的关键变量,保存追踪的关键变量在不同地方的取值上限和下限,并将维护信息插入源代码中.测试时通过路径松弛,在执行路径上不仅考虑追踪变量的当前测试用例值,判断程序是否出现整数溢出,还根据插入的维护信息进一步考虑追踪变量可能的取值范围,判断程序是否有可能出现整数溢出.实例研究验证了该方法的有效性,并且与同类方法相比,减少了检测量,提高了检测效率.
出处 《Journal of Southeast University(English Edition)》 EI CAS 2009年第2期219-223,共5页 东南大学学报(英文版)
基金 The National Natural Science Foundation of China (No.60873050,60703086) the Opening Foundation of State Key Laboratory of Software Engineering in Wuhan University (No.SKLSE20080717)
关键词 integer overflow buffer overflow path relaxation 整数溢出 缓冲区溢出 路径松弛
  • 相关文献

同被引文献26

  • 1WANG T L, WEI T, LIN Z Q, et al. Intscope: Automatically Detecting Integer Overflow Vulnerability in x86 Binary Using Symbolic Execution [C]// Proceedings of the 16th Network and Distributed System Security Symposium. San Diego, CA, 2009: 1-14. 被引量:1
  • 2CADAR C, DUNBAR D, ENGLER D. Klee: Unassisted and Automatic Generation of High-coverage Tests for Complex Systems Programs [C]//Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'08). San Diego, CA, 2008: 209-224. 被引量:1
  • 3BRUNMLEY D, CHIUEH T C, JOHNSON R, et al. Rich: Automatically Protecting Against Integer-based Vulnerabilities [C]// Proceedings of the 14th Annual Network and Distributed System Security Symposium(NDSS). San Diego, 2007. 被引量:1
  • 4CADAR C, GANESHA V, PAWLOWSKI P M, et al. Exe:Automatically Generating Inputs of Death [C]//Proceedings of the 13th ACM Conference on CCS, Virginia. New York: ACM, 2006: 322-335. 被引量:1
  • 5DOR N, RODEH M, SAGIV M. Cssv: Towards a Realistic Tool for Statically Detecting All Buffer Overflows [C]// Proceedings of the ACM SIGPLAN2003 Conference on Programming Language Design and Implementation. New York: ACM, 2003: 155-167. 被引量:1
  • 6HAUGH E, BISHOP M. Testing C Programs for Buffer Overflow Vulnerabilities [C]//Proceedings of the 10th Network and Distributed System Security Symposium. SanDiego, 2003: 123-130. 被引量:1
  • 7WILANDER J, KAMKAR M. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention [C]// Proceedings of the 10th NDSS. SanDiego, 2003: 149-162. 被引量:1
  • 8LHEE K S, CHAPIN S J. Buffer Overflow and Format String Overflow Vulnerabilities [J]. Sofware: Practice and Experience, 2003, 33(5): 423-460. 被引量:1
  • 9GOK M. Integer Squarers with Overflow Detection [J]. Computers and Electrical Engineering, 2008, 34 (5): 378- 391. 被引量:1
  • 10GOK M. Integer Multipliers with Overflow Detection[ J ]. IEEE Transactions on Computers, 2006, 55 (8): 1062-1066. 被引量:1

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部