An Empirical Study on Detecting and Fixing Buffer Overflow Bugs

@article{Ye2016AnES,
  title={An Empirical Study on Detecting and Fixing Buffer Overflow Bugs},
  author={Tao Ye and Lingming Zhang and Linzhang Wang and Xuandong Li},
  journal={2016 IEEE International Conference on Software Testing, Verification and Validation (ICST)},
  year={2016},
  pages={91-101}
}
  • Tao Ye, L. Zhang, +1 author Xuandong Li
  • Published 11 April 2016
  • Computer Science
  • 2016 IEEE International Conference on Software Testing, Verification and Validation (ICST)
Buffer overflow is one of the most common types of software security vulnerabilities. Although researchers have proposed various static and dynamic techniques for buffer overflow detection, buffer overflow attacks against both legacy and newly-deployed software systems are still quite prevalent. Compared with dynamic detection techniques, static techniques are more systematic and scalable. However, there are few studies on the effectiveness of state-of-the-art static buffer overflow detection… Expand
BovInspector: Automatic inspection and repair of buffer overflow vulnerabilities
TLDR
BovInspector is a tool framework for automaticstatic buffer overflow warnings inspection and validated bugs repair and is complementary to prior static buffer overflow discovery schemes. Expand
CSOD: Context-Sensitive Overflow Detection
TLDR
CSOD is proposed, a novel context-sensitive overflow detection technique that can dynamically adjust its detection strategy based on the behavior of different allocation calling contexts, enabling it to effectively detect overflows in millions of objects via four hardware watchpoints. Expand
An automated approach to fix buffer overflows
TLDR
The results suggest that the proposed approach can automatically fix buffer overflows without inducing errors. Expand
What Do We Know About Buffer Overflow Detection?
TLDR
The authors present a comprehensive systematic review on techniques intended to detecting BO vulnerabilities before releasing a software to production, finding that most of the studies addresses several vulnerabilities or memory errors, being not specific to BO detection. Expand
Static detection of real-world buffer overflow induced by loop
TLDR
A novel static detection technique, DBloop, is proposed to localize BoFs induced by loops to get the extremum length of data-movement on the buffer by analyzing target loops and then check whether the buffer overruns using constraint solving. Expand
Prober: Practically Defending Overflows with Page Protection
TLDR
Prober is a novel system aiming to detect and prevent heap overflows in the production environment that not only stops possible attacks on time, but also reports the faulty instructions that could guide bug fixes. Expand
Automatic Prevention of Buffer Overflow Vulnerability Using Candidate Code Generation
TLDR
The research was aimed at developing a technique capable of generating substitution code for the detection of buffer overflow vulnerability in C/C++ programs, and showed that statements containing buffer overflow vulnerabilities could be detected and prevented by using a substitution variable and by sanitizing code vulnerabilities based on the size of the variables. Expand
An Empirical Study on Stack Overflow Security Vulnerability in Well-known Open Source Software Systems
TLDR
In this article, it has been shown that how stack overflow occurs in a software system and a survey has been conducted on three popular open source projects Linux, Git and PHP, which show that the projects contain such code portions in which it is possible to overflow the stacks and inject malicious script to harm the normal execution of processes. Expand
An instrumentation based algorithm for stack overflow detection
TLDR
An algorithm based on the dynamic instrumentation of binaries is proposed, that is, dynamic local variables belonging to the functions of the program are detected, and a check is performed to see whether there is an overflow of memory between them. Expand
Automatic Buffer Overflow Warning Validation
TLDR
Experimental results on real open source programs show that BovInspector can automatically validate on average 60% of total warnings reported by static tools, complementary to prior static buffer overflow discovery schemes. Expand
...
1
2
3
...

References

SHOWING 1-10 OF 31 REFERENCES
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
  • C. Cowan
  • Computer Science
  • USENIX Security Symposium
  • 1998
TLDR
StackGuard is described: a simple compiler technique that virtually eliminates buffer overflow vulnerabilities with only modest performance penalties, and a set of variations on the technique that trade-off between penetration resistance and performance. Expand
Marple: a demand-driven path-sensitive buffer overflow detector
TLDR
A static analyzer for detecting and helping diagnose buffer overflows with the key idea of categorizing program paths as they relate to vulnerability, which combines path-sensitivity with a demand-driven analysis for precision and scalability. Expand
Discovering buffer overflow vulnerabilities in the wild: an empirical study
TLDR
An empirical study on reporters of buffer overflow vulnerabilities to understand the methods and tools used during the discovery found that in spite of many apparent choices, reporters follow similar approaches. Expand
Statically Detecting Likely Buffer Overflow Vulnerabilities
TLDR
An implementation of a new approach to mitigating buffer overflow vulnerabilities by detecting likely vulnerabilities through an analysis of the program source code is described that extends the LCLint annotation-assisted static checking tool. Expand
Evaluating Static Analysis Tools for Detecting Buffer Overflows in C Code
TLDR
This project evaluated five static analysis tools using a diagnostic test suite to determine their strengths and weaknesses in detecting a variety of buffer overflow flaws in C code, and Splint detected significantly fewer overflows and exhibited the highest false alarm rate. Expand
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution
TLDR
This paper presents a system, IntScope, which can automatically detect integer overflow vulnerabilities in x86 binaries before an attacker does, with the goal of finally eliminating the vulnerabilities. Expand
Static analysis of source code security: Assessment of tools against SAMATE tests
TLDR
An objective assessment results following a well-defined and repeatable methodology that analyzes the performance detecting security vulnerabilities of static analysis tools, in terms of vulnerabilities coverage and effectiveness for detecting the highest number of vulnerabilities having few false positives is provided. Expand
Testing C Programs for Buffer Overflow Vulnerabilities
TLDR
A testing technique that instruments programs with code that keeps track of memory buffers, and checks arguments to functions to determine if they satisfy certain conditions, warns when a buffer overflow may occur when executed with ”normal” test data. Expand
A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention
TLDR
This thesis contributes to three research areas in software security, namely security requirements and intrusion prevention via static analysis and runtime detection, and proposes decorated dependence graphs as a way of modeling and pattern matching security properties of code. Expand
Chucky: exposing missing checks in source code for vulnerability discovery
TLDR
In an empirical evaluation with five popular open-source projects, Chucky is able to accurately identify artificial and real missing checks, which ultimately enables us to uncover 12 previously unknown vulnerabilities in two of the projects (Pidgin and LibTIFF). Expand
...
1
2
3
4
...