A Software Vulnerability Detection Method Based on Pointer Analysis

A software vulnerability and pointer analysis technology, applied in the field of software vulnerability detection, can solve problems such as inaccurate recovery of complex data types, insufficient use of pointer variable information, etc., and achieve the effect of improving security and accuracy

Inactive Publication Date: 2017-02-01
NANJING UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, for the recovery of complex data types, most of them use simple type derivation or the method of analyzing the access interval of complex data types, which does not make full use of pointer variable information, making the recovery of complex data types inaccurate.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Software Vulnerability Detection Method Based on Pointer Analysis
  • A Software Vulnerability Detection Method Based on Pointer Analysis
  • A Software Vulnerability Detection Method Based on Pointer Analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Such as figure 1 As shown, Valgrind is a plug-in software that can realize dynamic analysis of executable programs. Use this platform to complete the instrumentation of executable programs. After the program is executed, the inserted code is executed, and data type recovery and software vulnerability detection are implemented. Start the Valgrind program, specify the used instrumentation operation, the program to be instrumented, the library function query file and the output file, etc., and the corresponding instrumentation operation can be realized.

[0018] The three main instrumentation operations are basic data type recovery, complex data type recovery, and vulnerability detection. The instrumentation of basic data type recovery, the input file is the executable program to be instrumented, the instrumentation operation is: insert the type collection code after the instructions belonging to the type-sensitive instruction set, and then insert different types according t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A software vulnerability detection method based on pointer analysis includes the following steps that with the help of instrumentation software, three main instrumentation operations of basic data type recovery, complex data type recovery and vulnerability detection are respectively finished, wherein the instrumentation operation of basic data type recovery includes the processes that type collection codes are inserted behind instructions belonging to a type sensitive instruction set, and then propagation codes of different types are inserted according to different assembly instructions; the instrumentation operation of complex data type recovery includes the processes that pointer collection codes are inserted behind a memory application instruction set, pointer analysis codes are inserted according to different assembly instructions, and then complex data types are recovered in the pointer analysis process; the instrumentation operation of vulnerability detection includes the processes that pollution marking codes are inserted to external input positions of programs, stain spreading codes are inserted according to assembly instructions, and security detection codes are inserted to security sensitive points.

Description

Technical field [0001] The invention relates to a software vulnerability detection method related to complex data types, in particular to a software vulnerability detection method based on pointer analysis. Background technique [0002] Software vulnerabilities are systems that are vulnerable to attacks and affect system availability. Among software vulnerabilities, vulnerabilities related to complex data types account for a larger proportion, and vulnerabilities that can be exploited to achieve attacks account for a larger proportion. It is a common method to find and eliminate software vulnerabilities through analysis and detection of programs. To achieve effective vulnerability detection of executable programs, the recovery of complex data types is the key. At present, for the recovery of complex data types, most of them adopt simple type derivation or the method of analyzing the access interval of complex data types. The pointer variable information is not fully utilized, m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
Inventor 曾庆凯李会朋
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products