Detection method for buffer overflow of reconstructed CoSy intermediate representation

A buffer overflow and intermediate representation technology, applied in the field of information security, can solve the problems of inaccurate buffer state judgment method, inaccurate representation method, and inaccurate judgment results, so as to achieve comprehensive judgment results, reduce complexity, and accurately express Effect

Active Publication Date: 2012-09-12
58TH RES INST OF CETC
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The disadvantages of this method are: (1) The redundant algorithm is only for the abstract syntax tree generated by the GCC compiler, which is not universal. For the abstract syntax tree generated by other similar compilation systems, the algorithm needs to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method for buffer overflow of reconstructed CoSy intermediate representation
  • Detection method for buffer overflow of reconstructed CoSy intermediate representation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0047] like figure 1 Shown, the buffer overflow detection method of reconstruction CoSy intermediate representation of the present invention, buffer overflow wherein refers to the buffer overflow on the stack, the concrete process of this method is as follows:

[0048] Step a, CoSy (compiler development tool of ACE company) compiler analyzes and scans the source program, and generates an intermediate representation CCMIR;

[0049] Step b. Reconstruct the CoSy intermediate representation CCMIR text, and add attributes to all non-static local variables for judging buffer overflow;

[0050] In step b, the method of reconstructing CCMIR is:

[0051] b1) Define DTD rules to convert CCMIR text into XML text storage;

[0052] The reason for converting to XML documents is because the CCMIR hierarchy is very suitable for XML documents, and XML docu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims at providing a detection method for buffer overflow of reconstructed CoSy intermediate representation, namely a method for analyzing a source code and detecting the buffer overflow. The method comprises the steps of: (1) analyzing and scanning a source program by a CoSy compiler to generate intermediate representation CCMIR (common CoSy medium-level intermediate representation); (2) reconstructing a CCMIR text and increasing a safety attribution to a non-static-state local variable, so as to judge the buffer overflow; and (3) judging the buffer overflow of the final intermediate representation CCMIR. By the adoption of the method, the code can be rapidly reconstructed, and the reconstruction process is simple and feasible and has excellent versatility; and rapid and high-efficiency detection on the potential errors, which cause the buffer overflow, in the program can be realized after reconstruction.

Description

technical field [0001] The invention relates to a method for reconstructing an intermediate representation compiled by CoSy and performing buffer overflow detection, belonging to the technical field of information security. Background technique [0002] With the rapid development of computer technology and communication technology, the entire society relies more and more on computer technology, and all parties have higher and higher requirements for system security. However, the reality is that the security incidents of computer systems are becoming more and more serious. Among the security incidents in recent years, the security incidents related to the buffer zone exceed 50%. The buffer overflow security incidents of programs developed in C language have a high occurrence rate. C language plays an irreplaceable role in computer software development and is widely used in embedded development, system software, application software, etc., but C language itself lacks a securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/36G06F9/45
Inventor 张梅娟阮园黄嵩人于宗光
Owner 58TH RES INST OF CETC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products