Loading…

Detecting Integer Overflow Vulnerabilities in Binary Executables Based on Target Filtering and Dynamic Taint Tracing

The number of identified integer overflow vulnerabilities has been increasing rapidly in recent years. In this paper, a smart software vulnerability detection technology is presented, which is used for the identifica- tion of integer overflow vulnerabilities in binary executa- bles. The proposed alg...

Full description

Saved in:
Bibliographic Details
Published in:电子学报:英文版 2014-04, Vol.23 (2), p.348-352
Main Author: CUI Baojiang LIANG Xiaobing ZHAO Bing ZHAI Feng WANG Jianxin
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 352
container_issue 2
container_start_page 348
container_title 电子学报:英文版
container_volume 23
creator CUI Baojiang LIANG Xiaobing ZHAO Bing ZHAI Feng WANG Jianxin
description The number of identified integer overflow vulnerabilities has been increasing rapidly in recent years. In this paper, a smart software vulnerability detection technology is presented, which is used for the identifica- tion of integer overflow vulnerabilities in binary executa- bles. The proposed algorithm is combined with Target fil- tering and dynamic taint tracing (TFDTT). Dynamic taint tracing is used to reduce the mutation space and target fil- tering function is used to filter test cases during the process of test case generation. Theory analysis indicates that the efficiency of TFDTT is higher than NonTF-DTT and ran- dom Fuzzing technology. And the experiment results in- dicate that the detection technology based upon TFDTT can identify the possible integer vulnerabilities in binary program, meanwhile, it is more efficiency than other two technologies.
format article
fullrecord <record><control><sourceid>chongqing</sourceid><recordid>TN_cdi_chongqing_primary_49522457</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>49522457</cqvip_id><sourcerecordid>49522457</sourcerecordid><originalsourceid>FETCH-LOGICAL-c181t-8b8d4656fb5ee3ead73154894a59e8c941b5c60fea6e99a615631f1c98a364df3</originalsourceid><addsrcrecordid>eNotj8tOwzAURL0Aiar0H8wHRIrjR-wlfUGlSt0EttW1cx0spS44LtC_xwhWI81IZ2ZuyIzVTVMJJfkdWUxTsHWt2loy1sxIXmNGl0Mc6C5mHDDRwycmP56_6OtljJjAhjHkgBMNkS5DhHSlm290lwx2LO4SJuzpOdIO0oCZbsOYMf0CIfZ0fY1wCq6EIWbaJXAluSe3HsYJF_86Jy_bTbd6rvaHp93qcV85plmutNV9Wa28lYgcoW85k0IbAdKgdkYwK52qPYJCY0AxqTjzzBkNXIne8zl5-OO6t3McPkrz8T2FU3lwFEY2jZAt_wHaU1er</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Detecting Integer Overflow Vulnerabilities in Binary Executables Based on Target Filtering and Dynamic Taint Tracing</title><source>IEEE Xplore All Journals</source><creator>CUI Baojiang LIANG Xiaobing ZHAO Bing ZHAI Feng WANG Jianxin</creator><creatorcontrib>CUI Baojiang LIANG Xiaobing ZHAO Bing ZHAI Feng WANG Jianxin</creatorcontrib><description>The number of identified integer overflow vulnerabilities has been increasing rapidly in recent years. In this paper, a smart software vulnerability detection technology is presented, which is used for the identifica- tion of integer overflow vulnerabilities in binary executa- bles. The proposed algorithm is combined with Target fil- tering and dynamic taint tracing (TFDTT). Dynamic taint tracing is used to reduce the mutation space and target fil- tering function is used to filter test cases during the process of test case generation. Theory analysis indicates that the efficiency of TFDTT is higher than NonTF-DTT and ran- dom Fuzzing technology. And the experiment results in- dicate that the detection technology based upon TFDTT can identify the possible integer vulnerabilities in binary program, meanwhile, it is more efficiency than other two technologies.</description><identifier>ISSN: 1022-4653</identifier><language>eng</language><subject>二进制 ; 可执行文件 ; 整数 ; 污点 ; 测试用例生成 ; 溢出漏洞 ; 滤波 ; 跟踪检测</subject><ispartof>电子学报:英文版, 2014-04, Vol.23 (2), p.348-352</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/86774X/86774X.jpg</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>CUI Baojiang LIANG Xiaobing ZHAO Bing ZHAI Feng WANG Jianxin</creatorcontrib><title>Detecting Integer Overflow Vulnerabilities in Binary Executables Based on Target Filtering and Dynamic Taint Tracing</title><title>电子学报:英文版</title><addtitle>Chinese of Journal Electronics</addtitle><description>The number of identified integer overflow vulnerabilities has been increasing rapidly in recent years. In this paper, a smart software vulnerability detection technology is presented, which is used for the identifica- tion of integer overflow vulnerabilities in binary executa- bles. The proposed algorithm is combined with Target fil- tering and dynamic taint tracing (TFDTT). Dynamic taint tracing is used to reduce the mutation space and target fil- tering function is used to filter test cases during the process of test case generation. Theory analysis indicates that the efficiency of TFDTT is higher than NonTF-DTT and ran- dom Fuzzing technology. And the experiment results in- dicate that the detection technology based upon TFDTT can identify the possible integer vulnerabilities in binary program, meanwhile, it is more efficiency than other two technologies.</description><subject>二进制</subject><subject>可执行文件</subject><subject>整数</subject><subject>污点</subject><subject>测试用例生成</subject><subject>溢出漏洞</subject><subject>滤波</subject><subject>跟踪检测</subject><issn>1022-4653</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNotj8tOwzAURL0Aiar0H8wHRIrjR-wlfUGlSt0EttW1cx0spS44LtC_xwhWI81IZ2ZuyIzVTVMJJfkdWUxTsHWt2loy1sxIXmNGl0Mc6C5mHDDRwycmP56_6OtljJjAhjHkgBMNkS5DhHSlm290lwx2LO4SJuzpOdIO0oCZbsOYMf0CIfZ0fY1wCq6EIWbaJXAluSe3HsYJF_86Jy_bTbd6rvaHp93qcV85plmutNV9Wa28lYgcoW85k0IbAdKgdkYwK52qPYJCY0AxqTjzzBkNXIne8zl5-OO6t3McPkrz8T2FU3lwFEY2jZAt_wHaU1er</recordid><startdate>20140401</startdate><enddate>20140401</enddate><creator>CUI Baojiang LIANG Xiaobing ZHAO Bing ZHAI Feng WANG Jianxin</creator><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope></search><sort><creationdate>20140401</creationdate><title>Detecting Integer Overflow Vulnerabilities in Binary Executables Based on Target Filtering and Dynamic Taint Tracing</title><author>CUI Baojiang LIANG Xiaobing ZHAO Bing ZHAI Feng WANG Jianxin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c181t-8b8d4656fb5ee3ead73154894a59e8c941b5c60fea6e99a615631f1c98a364df3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>二进制</topic><topic>可执行文件</topic><topic>整数</topic><topic>污点</topic><topic>测试用例生成</topic><topic>溢出漏洞</topic><topic>滤波</topic><topic>跟踪检测</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>CUI Baojiang LIANG Xiaobing ZHAO Bing ZHAI Feng WANG Jianxin</creatorcontrib><collection>维普_期刊</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><jtitle>电子学报:英文版</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>CUI Baojiang LIANG Xiaobing ZHAO Bing ZHAI Feng WANG Jianxin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Detecting Integer Overflow Vulnerabilities in Binary Executables Based on Target Filtering and Dynamic Taint Tracing</atitle><jtitle>电子学报:英文版</jtitle><addtitle>Chinese of Journal Electronics</addtitle><date>2014-04-01</date><risdate>2014</risdate><volume>23</volume><issue>2</issue><spage>348</spage><epage>352</epage><pages>348-352</pages><issn>1022-4653</issn><abstract>The number of identified integer overflow vulnerabilities has been increasing rapidly in recent years. In this paper, a smart software vulnerability detection technology is presented, which is used for the identifica- tion of integer overflow vulnerabilities in binary executa- bles. The proposed algorithm is combined with Target fil- tering and dynamic taint tracing (TFDTT). Dynamic taint tracing is used to reduce the mutation space and target fil- tering function is used to filter test cases during the process of test case generation. Theory analysis indicates that the efficiency of TFDTT is higher than NonTF-DTT and ran- dom Fuzzing technology. And the experiment results in- dicate that the detection technology based upon TFDTT can identify the possible integer vulnerabilities in binary program, meanwhile, it is more efficiency than other two technologies.</abstract><tpages>5</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1022-4653
ispartof 电子学报:英文版, 2014-04, Vol.23 (2), p.348-352
issn 1022-4653
language eng
recordid cdi_chongqing_primary_49522457
source IEEE Xplore All Journals
subjects 二进制
可执行文件
整数
污点
测试用例生成
溢出漏洞
滤波
跟踪检测
title Detecting Integer Overflow Vulnerabilities in Binary Executables Based on Target Filtering and Dynamic Taint Tracing
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T06%3A41%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-chongqing&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Detecting%20Integer%20Overflow%20Vulnerabilities%20in%20Binary%20Executables%20Based%20on%20Target%20Filtering%20and%20Dynamic%20Taint%20Tracing&rft.jtitle=%E7%94%B5%E5%AD%90%E5%AD%A6%E6%8A%A5%EF%BC%9A%E8%8B%B1%E6%96%87%E7%89%88&rft.au=CUI%20Baojiang%20LIANG%20Xiaobing%20ZHAO%20Bing%20ZHAI%20Feng%20WANG%20Jianxin&rft.date=2014-04-01&rft.volume=23&rft.issue=2&rft.spage=348&rft.epage=352&rft.pages=348-352&rft.issn=1022-4653&rft_id=info:doi/&rft_dat=%3Cchongqing%3E49522457%3C/chongqing%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c181t-8b8d4656fb5ee3ead73154894a59e8c941b5c60fea6e99a615631f1c98a364df3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_cqvip_id=49522457&rfr_iscdi=true