Buffer Overflow Vulnerability Detection based on Format-Matching on Source Level
- DOI
- 10.2991/lemcs-14.2014.70How to use a DOI?
- Keywords
- buffer overflow; rule-based detection; dynamic test; format-matching
- Abstract
Buffer overflow has become the most common software vulnerability, which seriously restricts the development of the software industry. It’s very essential to find out an effective method to detect this kind of software bugs accurately. In this paper, we design an improved buffer overflow detection system. At first, our system preprocesses the source code to add some auxiliary detection symbols. Then, it scans the source code by a static detector, which uses the identifier for auxiliary detection and combines with a dynamic detection method to improve the recognition accuracy and detection capability. Finally, we make a comparison between our system and the original detection system. To assess the usefulness of this approach, several experiments are performed on a simulation system, and we can draw a conclusion that our system performs better than other detection software. The method proposed in this paper is of the important application value and can improve detection accuracy.
- Copyright
- © 2014, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Xiaoyu Wang AU - Qiaoyan Wen AU - Zhao Zhang PY - 2014/05 DA - 2014/05 TI - Buffer Overflow Vulnerability Detection based on Format-Matching on Source Level BT - Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science PB - Atlantis Press SP - 298 EP - 301 SN - 1951-6851 UR - https://doi.org/10.2991/lemcs-14.2014.70 DO - 10.2991/lemcs-14.2014.70 ID - Wang2014/05 ER -