Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Parallelization security hole detecting method based on function call graph

A function call graph and vulnerability detection technology, which is applied in the field of parallel detection of source code vulnerabilities, can solve the problems of high false alarm rate, inability to directly detect program vulnerabilities, inability to detect more complex buffer operation security, etc.

Inactive Publication Date: 2012-07-11
BEIHANG UNIV
View PDF2 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Different from the static detection method, the dynamic detection technology has no limit to the size of the program and can detect large programs. However, the obvious disadvantage is that the dynamic detection technology is dependent on the input, and only when a specific input makes the program execute to a dangerous point Vulnerabilities are not discovered until , resulting in a high rate of false positives
[0004] Simple model detection methods generally cannot directly detect program vulnerabilities. For example, Blast used Securd to detect references to null pointers in programs, but it cannot detect the security of more complex buffer operations.
Furthermore, model checking methods suffer from the state-space explosion problem when testing large-scale programs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Parallelization security hole detecting method based on function call graph
  • Parallelization security hole detecting method based on function call graph
  • Parallelization security hole detecting method based on function call graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention utilizes static analysis to track the calling relationship of functions in the program through the method of generating a function relationship calling graph, and provides corresponding scheduling information for the analysis and scheduling module, and then, on this basis, the files that need to be inserted are processed by the preprocessing module Finally, the parallel model detection is realized through the detection module, so as to realize the detection and analysis of security loopholes and ensure the accurate detection of source code loopholes. Structure diagram such as figure 1 .

[0021] 1. Call graph generation module

[0022] Firstly, this module generates the function call diagram of the software to be tested, which can conveniently start analysis and detection from the underlying functions, and can also conveniently schedule the entire detection process.

[0023] In the process of realization, we have utilized the features of GCC's Re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a parallelization security hole detecting method based on a function call graph, which is characterized in that a function set to be detected is determined by analyzing the function call relation in a C language module, instrumentation and assert analysis are performed for the function set by means of the preprocessing technology, and then security holes of a program are detected by the aid of model checking and the parallelization technology. The method mainly includes the steps: generating the function relation call graph, and determining C function information to be detected by analyzing the function relation call graph; extracting attribute information of a buffer area related to C program source codes by the aid of the constraint analysis technology, and inserting corresponding ASSERT statement information in a variable declaration, an assignment and a function call point by means of the attribute information of the buffer area; and performing accessibility judgment for the instrumented codes, and analyzing whether a dangerous point in the program includes an accessible path to discover the security holes in the source codes or not. The method detects the security holes such as buffer area overflow and the like by combining the constraint analysis static detecting technology, model checking and the parallelization technology, and the detecting precision of the method is higher than that of the general static detecting technology.

Description

Technical field: [0001] The invention relates to a parallel detection method for source code loopholes. Background technique: [0002] With the development of information technology, computer software has penetrated into various fields of the national economy and is closely related to people's production and life. The security of software is becoming more and more important. Once some key software is damaged, it will cause industrial and even national paralysis. Malicious users can target specific software errors and run malicious code to gain access to illegal data. Buffer overflow vulnerability is the most important kind of this kind of security hole at present. Malicious users can analyze the input data format of the program and determine that these data are stored in the buffer of the program, so that the user may overwrite the sensitive data in the stack space through special input data, especially return the saved The address is replaced with the address of the ille...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/36G06F21/00G06F21/57
Inventor 王雷王刚王欢陈归李康
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products