Source code facing buffer overflow detection method based on inequalities solving

A technology of buffer overflow and detection method, which is applied in the detection of buffer overflow in source code and the field of buffer overflow detection, which can solve the problem that the influence of buffer variables or parameter length attributes cannot be accurately grasped.

Inactive Publication Date: 2008-08-13
BEIJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0047] In view of this, the purpose of the present invention is to provide a kind of source code-oriented method for detecting buffer overflow based on the solution of inequality groups for the deficiencies in the existing buffer overflow detection technology. The method is based on static code analysis technology and Inequality automatic proof theory, which is successfully developed by making full use of traditional technology and developing and innovating, can overcome the shortcomings of previous static code analysis technology, and better solve the problem of buffer variables or parameters when the existing method handles the program control relationship. The impact of the length attribute cannot be accurately grasped, effectively reducing the false positive rate of buffer overflow vulnerability detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Source code facing buffer overflow detection method based on inequalities solving
  • Source code facing buffer overflow detection method based on inequalities solving
  • Source code facing buffer overflow detection method based on inequalities solving

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0061] Referring to Fig. 2, specifically introduce the buffer overflow detection method that the present invention is oriented to the source code and solve based on the group of inequalities, the method comprises the following steps:

[0062] (1) Initialize the constraints describing the dangerous function;

[0063] The specific operation content of this step is: define the length attribute of buffer related parameters, specify the expression method of parameters or variables in the buffer area, and define multiple C / C ++ The library functions respectively establish the inequality constraints for which buffer overflows occur. Because the operation content of this step is basically the same as step 1 and step 2 of the traditional method, it will not be repeated he...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a overflow detecting method of buffer solving based on the set of inequalities faced to the source code, including following steps: (1) processing initialization set in order to describe constraint condition of the risk function; (2) processing morphology and grammar analysis to the input program source code to generate a program dependency graph; (3) finding relative risk function callable statement in the program dependency graph according to inequality constraint condition of the buffer overflow in the risk function base; (4) finding sentence having data dependent or control relation with the risk function in the program dependency graph aimed to the found risk function to form dependent sentence sequence, in other words a set of inequalities; (5) verifying constraint condition of the inequality in the buffer overflow whether establishing or not. The method can greatly resolve the problems of inaccurate grasp fault of the impact of the length property of the buffer variable or parameter when processing program control relation in the present static code analyzing technology, effectively reduces the rate of false alarm of the buffer overflow exploit code.

Description

technical field [0001] The present invention relates to a technology of how to detect buffer overflow in computer software source code, to be precise, relates to a method for detecting buffer overflow in source code based on solving inequality groups, which belongs to software security technology in information security field. Background technique [0002] In today's information society, the status of computer software is becoming more and more important. The continuous innovation of software development technology enables the software to achieve very rich and powerful functions, while the interface presented to users is simpler and more convenient. However, the security risks associated with software are also increasing day by day. Not only are the number far greater than ever before, but the degree of harm is also extremely serious. The large scale of software, the instability of newly developed software technology and the defects of classic software technology will all ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/12
Inventor 徐国爱张淼刘宇航杨义先
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products