期刊文献+

动静结合的整数溢出漏洞分析方法 被引量:2

Dynamic and static analyses of integer overflow vulnerabilities
原文传递
导出
摘要 依据整数溢出漏洞特征,该文在对220个实际整数溢出漏洞分析的基础上提出了3种检测策略来缓解静态分析技术的高误报问题。结合静态分析可直接获取整数溢出类型信息及动态分析获取整数溢出漏洞准确的优点,提出了动静结合的整数溢出漏洞分析方法。先利用程序静态分析技术分析整数溢出并获取整数溢出类型等相关信息,动态分析根据静态分析得到的信息,使用自动插桩技术对代码进行插桩,结合漏洞特征设计的重构表达式运行具体符号执行以提高漏洞分析的准确率。动静结合的整数溢出漏洞分析方法减少误报效果较好:对Lighttpd-1.4.29进行检测时减少误报374条,占总量的67.3%;对Linux内核3.4版本进行检测时减少误报159 761条,占总量的98.2%;并最终成功分析出CVE-2011-4362、CVE-2013-1763整数溢出漏洞。 Different software vulnerabilities have different characteristics. 220 integer overflow vulnerabilities are analyzed to develop three kinds of detection strategies to reduce the false positives from static analyses. Static analyses identify the type of integer overflow while dynamic analyses accurately identify the integer overflow vulnerability. This method combines the advantages of the two analyses to detect vulnerabilities. The static analysis is used to detect the integer overflow and obtain the integer overflow type and related information. This information is then used by the dynamic analysis to insert hooks into the code using the automatic pile technique. Then, the algorithm calls the integer overflow marker interface and performs symbolic execution with the reconstruction expressions. This method is used to analyze the Lighttpd-1. 4. 29 and Linux kernel 3.4 systems. This method can greatly reduce the number of false positives. The number of false positives for Lighttpd-l. 4. 29 is reduced by 374, accounting for 67.3% of the total. The number of false positives for Linux kernel 3.4 is reduced by 159 761, accounting for 98.2% of the total. This system also successfully finds the CVE-2011-4362 and CVE-2013-1763 integer overflow vulnerabilities.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2014年第9期1173-1178,共6页 Journal of Tsinghua University(Science and Technology)
基金 国家杰出青年科学基金项目(61125102)
关键词 漏洞分析 整数溢出 静态分析 动态分析 符号执行 vulnerability analysis integer overflow static analysis dynamic analysis symbolic execution
  • 相关文献

参考文献13

  • 1Wojtczuk R.UQBTng:A tool capable of automatically finding integer overflows in Win32binaries[C]//22nd Chaos Communication Congress.Berlin,Germany,2005. 被引量:1
  • 2Christey S,Martin R A.Vulnerability Type Distributions in CVE[EB/OL].[2007-05-22].http://cwe.mitre.org/documents/vuln-trends/index.html. 被引量:1
  • 3Statistics Results[EB/OL].[2013-12-30].http://web.nvd.nist.gov/view/vuln/statistics-results. 被引量:1
  • 4王铁磊..面向二进制程序的漏洞挖掘关键技术研究[D].北京大学,2011:
  • 5WANG Xi,Chen H,Jia Z,et al.Improving integer security for systems with KINT[C]//Proceedings of the 10-th USENIX Conference on Operating Systems Design and Implementation.Hollywood,CA,USA:USENIX Association,2012:163-177. 被引量:1
  • 6吴世忠,郭涛,董国伟,王嘉捷.软件漏洞分析技术进展[J].清华大学学报(自然科学版),2012,52(10):1309-1319. 被引量:30
  • 7Chipounov V,Kuznetsov V,Candea G.S2E:A platform for in-vivo multi-path analysis of software systems[J].ACM SIGARCH Computer Architecture News,2011,39(1):265-278. 被引量:1
  • 8Chipounov V,Kuznetsov V,Candea G.The S2Eplatform:Design,implementation,and applications[J].ACM Transactions on Computer Systems:TOCS,2012,30(1):1-49. 被引量:1
  • 9Cadar C,Dunbar D,Engler D R.KLEE:Unassisted and automatic generation of high-coverage tests for complex systems programs[C]//Operating Systems Design and Implementation.San Diego,USA:OSDI,2008,8:209-224. 被引量:1
  • 10Bellard F.QEMU,a fast and portable dynamic translator[C]//USENIX Annual Technical Conference.Anaheim,CA,USA:FREENIX Track,2005:41-46. 被引量:1

二级参考文献8

共引文献29

同被引文献13

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部