中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
Heuristic path pruning algorithm based on error handling pattern recognition in detecting vulnerability

文献类型:会议论文

作者Chen, Dong (1) ; Zhang, Yang (1) ; Cheng, Liang (1) ; Deng, Yi (1) ; Sun, Xiaoshan (1)
出版日期2013
会议名称2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, COMPSACW 2013
会议日期July 22, 2013 - July 26, 2013
会议地点Kyoto, Japan
关键词symbolic execution path pruning error handling binary code vulnerability detection
页码95-100
中文摘要Using symbolic execution in path sensitive detection of software vulnerabilities develop quickly recently. It has a lot of application and research progress. However, symbolic execution still suffers from the scalability problem in practice, especially when applied to large scale or very complex programs. In this paper, we propose a new heuristic path pruning algorithm based on non-fatal error handling(NFEH) pattern recognition. Firstly, it use three patterns to recognize NFEH module in binary code and then stop analyzing NFEH branches when using symbolic execution. To demonstrate the effectiveness of this new approach, we have implemented a prototype tool PrunEbt based on a binary static integer vulnerability detecting tool (Statictaint). Experimental results are quite encouraging. PrunEbt can effectively recognize NFEH modules in binary program, significantly reduce the search space and have no omissions of true vulnerabilities. At last, it has detected one zero-day integer vulnerability in widely used image recognition library Libpng v1.5.13. © 2013 IEEE.
英文摘要Using symbolic execution in path sensitive detection of software vulnerabilities develop quickly recently. It has a lot of application and research progress. However, symbolic execution still suffers from the scalability problem in practice, especially when applied to large scale or very complex programs. In this paper, we propose a new heuristic path pruning algorithm based on non-fatal error handling(NFEH) pattern recognition. Firstly, it use three patterns to recognize NFEH module in binary code and then stop analyzing NFEH branches when using symbolic execution. To demonstrate the effectiveness of this new approach, we have implemented a prototype tool PrunEbt based on a binary static integer vulnerability detecting tool (Statictaint). Experimental results are quite encouraging. PrunEbt can effectively recognize NFEH modules in binary program, significantly reduce the search space and have no omissions of true vulnerabilities. At last, it has detected one zero-day integer vulnerability in widely used image recognition library Libpng v1.5.13. © 2013 IEEE.
收录类别CPCI ; EI
会议录出版地IEEE Computer Society, 2001 L Street N.W., Suite 700, Washington, DC 20036-4928, United States
语种英语
ISSN号7303157
ISBN号9780769549873
源URL[http://ir.iscas.ac.cn/handle/311060/16542]  
专题软件研究所_软件所图书馆_会议论文
推荐引用方式
GB/T 7714
Chen, Dong ,Zhang, Yang ,Cheng, Liang ,et al. Heuristic path pruning algorithm based on error handling pattern recognition in detecting vulnerability[C]. 见:2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, COMPSACW 2013. Kyoto, Japan. July 22, 2013 - July 26, 2013.

入库方式: OAI收割

来源:软件研究所

浏览0
下载0
收藏0
其他版本

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。