Heuristic path pruning algorithm based on error handling pattern recognition in detecting vulnerability
文献类型:会议论文
作者 | Chen, Dong (1) ; Zhang, Yang (1) ; Cheng, Liang (1) ; Deng, Yi (1) ; Sun, Xiaoshan (1) |
出版日期 | 2013 |
会议名称 | 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, COMPSACW 2013 |
会议日期 | July 22, 2013 - July 26, 2013 |
会议地点 | Kyoto, Japan |
关键词 | symbolic execution path pruning error handling binary code vulnerability detection |
页码 | 95-100 |
中文摘要 | Using symbolic execution in path sensitive detection of software vulnerabilities develop quickly recently. It has a lot of application and research progress. However, symbolic execution still suffers from the scalability problem in practice, especially when applied to large scale or very complex programs. In this paper, we propose a new heuristic path pruning algorithm based on non-fatal error handling(NFEH) pattern recognition. Firstly, it use three patterns to recognize NFEH module in binary code and then stop analyzing NFEH branches when using symbolic execution. To demonstrate the effectiveness of this new approach, we have implemented a prototype tool PrunEbt based on a binary static integer vulnerability detecting tool (Statictaint). Experimental results are quite encouraging. PrunEbt can effectively recognize NFEH modules in binary program, significantly reduce the search space and have no omissions of true vulnerabilities. At last, it has detected one zero-day integer vulnerability in widely used image recognition library Libpng v1.5.13. © 2013 IEEE. |
英文摘要 | Using symbolic execution in path sensitive detection of software vulnerabilities develop quickly recently. It has a lot of application and research progress. However, symbolic execution still suffers from the scalability problem in practice, especially when applied to large scale or very complex programs. In this paper, we propose a new heuristic path pruning algorithm based on non-fatal error handling(NFEH) pattern recognition. Firstly, it use three patterns to recognize NFEH module in binary code and then stop analyzing NFEH branches when using symbolic execution. To demonstrate the effectiveness of this new approach, we have implemented a prototype tool PrunEbt based on a binary static integer vulnerability detecting tool (Statictaint). Experimental results are quite encouraging. PrunEbt can effectively recognize NFEH modules in binary program, significantly reduce the search space and have no omissions of true vulnerabilities. At last, it has detected one zero-day integer vulnerability in widely used image recognition library Libpng v1.5.13. © 2013 IEEE. |
收录类别 | CPCI ; EI |
会议录出版地 | IEEE Computer Society, 2001 L Street N.W., Suite 700, Washington, DC 20036-4928, United States |
语种 | 英语 |
ISSN号 | 7303157 |
ISBN号 | 9780769549873 |
源URL | [http://ir.iscas.ac.cn/handle/311060/16542] ![]() |
专题 | 软件研究所_软件所图书馆_会议论文 |
推荐引用方式 GB/T 7714 | Chen, Dong ,Zhang, Yang ,Cheng, Liang ,et al. Heuristic path pruning algorithm based on error handling pattern recognition in detecting vulnerability[C]. 见:2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, COMPSACW 2013. Kyoto, Japan. July 22, 2013 - July 26, 2013. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。