首页 | 本学科首页   官方微博 | 高级检索  
     

基于信息流的整数漏洞插装和验证
引用本文:孙浩,李会朋,曾庆凯.基于信息流的整数漏洞插装和验证[J].软件学报,2013,24(12):2767-2781.
作者姓名:孙浩  李会朋  曾庆凯
作者单位:计算机软件新技术国家重点实验室. 南京大学, 江苏 南京 210093;南京大学 计算机科学与技术系, 江苏 南京 210093;计算机软件新技术国家重点实验室. 南京大学, 江苏 南京 210093;南京大学 计算机科学与技术系, 江苏 南京 210093;计算机软件新技术国家重点实验室. 南京大学, 江苏 南京 210093;南京大学 计算机科学与技术系, 江苏 南京 210093
基金项目:国家自然科学基金(61170070,90818022,61021062);国家科技支撑计划(2012BAK26B01);国家高技术研究发展计划(863)(2011AA1A202)
摘    要:为降低整数漏洞插装验证的运行开销,提出基于信息流的整数漏洞插装方法.从限定分析对象范围的角度出发,将分析对象约减为污染信息流路径上的所有危险整数操作,以降低静态插装密度.在GCC平台上,实现了原型系统DRIVER(detect and run-time check integer-based vulnerabilities with information flow).实验结果表明,该方法具有精度高、开销低、定位精确等优点.

关 键 词:整数漏洞  信息流  污点分析  插装
收稿时间:2012/8/31 0:00:00
修稿时间:2012/12/3 0:00:00

Statically Detect and Run-Time Check Integer-Based Vulnerabilities with Information Flow
SUN Hao,LI Hui-Peng and ZENG Qing-Kai.Statically Detect and Run-Time Check Integer-Based Vulnerabilities with Information Flow[J].Journal of Software,2013,24(12):2767-2781.
Authors:SUN Hao  LI Hui-Peng and ZENG Qing-Kai
Affiliation:State Key Laboratory for Novel Software Technology. Nanjing University, Nanjing 210093, China;Department of Computer Science and Technology, Nanjing University, Nanjing 210093, China;State Key Laboratory for Novel Software Technology. Nanjing University, Nanjing 210093, China;Department of Computer Science and Technology, Nanjing University, Nanjing 210093, China;State Key Laboratory for Novel Software Technology. Nanjing University, Nanjing 210093, China;Department of Computer Science and Technology, Nanjing University, Nanjing 210093, China
Abstract:An approach to detecting integer-based vulnerabilities is proposed based on information-flow analysis in order to improve the run-time performance. In this approach, only the unsafe integer operations on tainted information flow paths, which can be controlled by users and involved in sensitive operations, need to be instrumented with run-time check code, so that both the density of static instrumentation and performance overhead are reduced. Based on this approach, a prototype system called DRIVER (detect and run-time check integer-based vulnerabilities with information flow) is implemented as an extension to the GCC compiler and tested on a number of real-world applications. The experimental results show that this approach is effective, scalable, light-weight and capable of locating the root cause.
Keywords:integer-based vulnerability  information flow  taint analysis  instrumentation
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号