Adaptable Static Analysis of Executables for proving the Absence of Vulnerabilities

نویسنده

  • Bogdan Mihaila
چکیده

essential when representing program states where a memory region (a stack frame or heap cell) may or may not exist. No matter how precise an analysis is, a code auditor may have to deal with a large number of warnings when analyzing large programs. In order to improve the usability of the analyzer, we detail how combining static and dynamic analysis allows an auditor to focus the analyzer on potentially vulnerable code parts. Finally,we illustrate the analysis of particularly difficult examples. Specifically,we present the analysis of a subtle bug in Sendmail, where our analyzer is able to discover the fault in the vulnerable program version and verifies the corrected variant.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A System for Generating Static Analyzers for Machine Instructions

There is growing interest in analyzing executables to look for bugs and security vulnerabilities. This paper describes the design and implementation of a language for describing the semantics of an instruction set, along with a runtime system to support the static analysis of executables written in that instruction set. The work advances the state of the art by creating multiple analysis phases...

متن کامل

MEDS: The Memory Error Detection System

Memory errors continue to be a major source of software failure. To address this issue, we present MEDS (Memory Error Detection System), a system for detecting memory errors within binary executables. The system can detect buffer overflow, uninitialized data reads, double-free, and deallocated memory access errors and vulnerabilities. It works by using static analysis to prove memory accesses s...

متن کامل

A compiler level intermediate representation based binary analysis system and its applications

Title of Dissertation: A COMPILER LEVEL INTERMEDIATE REPRESENTATION BASED BINARY ANALYSIS SYSTEM AND ITS APPLICATIONS Kapil Anand, Doctor of Philosophy, 2013 Dissertation directed by: Professor Rajeev Barua Department of Electrical and Computer Engineering Analyzing and optimizing programs from their executables has received a lot of attention recently in the research community. There has been ...

متن کامل

Value-Range Analysis of C Programs: Towards Proving the Absence of Buffer Overflow Vulnerabilities

We may not be able to make you love reading, but value range analysis of c programs towards proving the absence of buffer overflow vulnerabilities will lead you to love reading starting from now. Book is the window to open the new world. The world that you want is in the better stage and level. World will always guide you to even the prestige stage of the life. You know, this is some of how rea...

متن کامل

Identifying Inter-Component Communication Vulnerabilities in Event-based Systems

Event based systems are flexible, scalable, and adaptable based on its feature of non-determinism in event communication. However, this may yield security vulnerabilities in event communication between components. For example, malicious components can steal sensitive data or manipulate other components in an intended way. This paper introduces SCUTUM, a novel technique that automatically detect...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015