首页 | 本学科首页   官方微博 | 高级检索  
     

格式化字符串漏洞自动检测与测试用例生成*
引用本文:黄 钊,黄曙光,邓兆琨,黄 晖. 格式化字符串漏洞自动检测与测试用例生成*[J]. 计算机应用研究, 2019, 36(8)
作者姓名:黄 钊  黄曙光  邓兆琨  黄 晖
作者单位:国防科学技术大学电子对抗学院,合肥,230037;国防科学技术大学电子对抗学院,合肥,230037;国防科学技术大学电子对抗学院,合肥,230037;国防科学技术大学电子对抗学院,合肥,230037
基金项目:国家重点研发计划“网络空间安全”重点专项(2017YFB0802905)
摘    要:格式化字符串漏洞是一种危害高、影响广的软件漏洞。当前漏洞检测方式存在人工依赖度高,误报率高,检测模型单一,未能充分考虑格式化字符串漏洞特点等多种局限性。针对以上问题,本文对格式化字符串漏洞特征进行分析,设计并实现了一种基于符号执行的格式化字符串漏洞自动检测与测试用例生成的系统。该方法可自动检测linux下二进制程序中格式化字符串漏洞的存在性,判定其是否可能导致任意内存读写危害,并生成稳定有效的测试用例。

关 键 词:格式化字符串漏洞  符号执行  自动检测  测试用例生成
收稿时间:2018-01-23
修稿时间:2019-06-30

Automatic Detection and Test Cases Generation of the Format String Vulnerability Based on Symbol Execution*
Huang Zhao,Huang Shuguang,Deng Zhaokun and Huang Hui. Automatic Detection and Test Cases Generation of the Format String Vulnerability Based on Symbol Execution*[J]. Application Research of Computers, 2019, 36(8)
Authors:Huang Zhao  Huang Shuguang  Deng Zhaokun  Huang Hui
Affiliation:Collage of Electronic Countermeasure,National University of Defense Technology,,,
Abstract:The format string vulnerability is a kind of software vulnerability which has high risk and wide impact. Currently, there are many limitations of vulnerability detection method, such as high degree of artificial dependence, high false positive rate, single detection model and failing to consider the characteristics of the format string vulnerability fully. To solve above problems, this paper analyzed the format string vulnerability. Then based on symbolic execution, the paper designed and produced a way to detect formatted string vulnerability and generate test cases automatically. This method could detect the existence of the format string vulnerability in Linux binary program automatically. Then it determined whether it could lead to harm, which allowed attackers to read or write arbitrary memory. Meanwhile it generated stable and effective test cases.
Keywords:format string vulnerability   symbolic execution   automatic detection   test cases generation
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号