skip to main content
10.1145/3318236.3318261acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicgdaConference Proceedingsconference-collections
research-article

An Analysis Model of Buffer Overflow Vulnerability Based on FSM

Authors Info & Claims
Published:15 March 2019Publication History

ABSTRACT

Buffer overflow vulnerabilities have been the most common form of software vulnerabilities. It is very difficult and time consuming to detect possible types of vulnerabilities from a program. This paper proposes an analysis model of buffer overflow vulnerability based on finite state machine (FSM). The model conducts static analysis on source code. And then it analyzes the formation of buffer overflow vulnerabilities and process of data overflow. For the two types of buffer overflow vulnerabilities caused by function call errors and loop copy errors, the corresponding vulnerability analysis model is designed. The vulnerability analysis model proposed in this paper is verified by two scenarios. The experimental results show that the model can detect buffer overflow vulnerability automatically and effectively.

References

  1. Peng J, Guo M, Quan J. Software Vulnerability and Application Security Risk. Information Resources Management Journal (IRMJ), 2019, 32(1): 48--57.Google ScholarGoogle ScholarCross RefCross Ref
  2. Li J, Chen J, Huang M, et al. An integration testing framework and evaluation metric for vulnerability mining methods. China Communications, 2018, 15(2): 190--208.Google ScholarGoogle ScholarCross RefCross Ref
  3. Medeiros I, Neves N, Correia M. Detecting and removing web application vulnerabilities with static analysis and data mining. IEEE Transactions on Reliability, 2016, 65(1): 54--69.Google ScholarGoogle ScholarCross RefCross Ref
  4. Markov A S, Fadin A A, Tsirlov V L. Multilevel metamodel for heuristic search of vulnerabilities in the software source code. International Journal of Control Theory and Applications, 2016, 9(30): 313--320.Google ScholarGoogle Scholar
  5. Smith J, Johnson B, Murphy-Hill E, et al. Questions developers ask while diagnosing potential security vulnerabilities with static analysis. Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering. ACM, 2015: 248--259. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Zhu J, Chu B, Lipford H, et al. Mitigating access control vulnerabilities through interactive static analysis. Proceedings of the 20th ACM Symposium on Access Control Models and Technologies. ACM, 2015: 199--209. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Shoshitaishvili Y, Wang R, Salls C, et al. Sok:(state of) the art of war: Offensive techniques in binary analysis. 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016: 138--157.Google ScholarGoogle Scholar
  8. Barabanov A V, Markov A S, Tsirlov V L. Methodological Framework for Analysis and Synthesis of a Set of Secure Software Development Controls. Journal of Theoretical & Applied Information Technology, 2016, 88(1).Google ScholarGoogle Scholar
  9. Li H, Kwon H, Kwon J, et al. CLORIFI: software vulnerability discovery using code clone verification. Concurrency and Computation: Practice and Experience, 2016, 28(6): 1900--1917. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Cai J, Zou P, Ma J, et al. Sworddta: A dynamic taint analysis tool for software vulnerability detection. Wuhan University Journal of Natural Sciences, 2016, 21(1): 10--20.Google ScholarGoogle ScholarCross RefCross Ref
  11. Holland B, Santhanam G R, Awadhutkar P, et al. Statically-informed dynamic analysis tools to detect algorithmic complexity vulnerabilities. Source Code Analysis and Manipulation (SCAM), 2016 IEEE 16th International Working Conference on. IEEE, 2016: 79--84.Google ScholarGoogle Scholar
  12. Graziano M, Canali D, Bilge L, et al. Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence. 24th {USENIX} Security Symposium ({USENIX} Security 15). 2015: 1057--1072. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ghaffarian S M, Shahriari H R. Software vulnerability analysis and discovery using machine-learning and data-mining techniques: a survey. ACM Computing Surveys (CSUR), 2017, 50(4): 56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Sadeghi A, Bagheri H, Garcia J, et al. A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software. IEEE Transactions on Software Engineering, 2017, 43(6): 492--530.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Mechtaev S, Yi J, Roychoudhury A. Angelix: Scalable multiline program patch synthesis via symbolic analysis. Proceedings of the 38th international conference on software engineering. ACM, 2016: 691--701. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Liu L, Xu J, Guo C, et al. Exposing SQL Injection Vulnerability through Penetration Test based on Finite State Machine. Computer and Communications (ICCC), 2016 2nd IEEE International Conference on. IEEE, 2016: 1171--1175.Google ScholarGoogle Scholar
  17. Chen Q, Zhao X, Yin H, et al. Structured Algorithm for Software Behavior Model based on Finite State Automaton. DEStech Transactions on Computer Science and Engineering, 2017 (csae).Google ScholarGoogle Scholar
  18. Shar L K, Briand L C, Tan H B K. Web application vulnerability prediction using hybrid program analysis and machine learning. IEEE Transactions on Dependable and Secure Computing, 2015, 12(6): 688--707.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Liu B, Shi L, Cai Z, et al. Software vulnerability discovery techniques: A survey. Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on. IEEE, 2012: 152--156. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Li Y, Ji S, Lv C, et al. V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing. arXiv preprint arXiv:1901.01142, 2019.Google ScholarGoogle Scholar
  21. Arzt S, Rasthofer S, Hahn R, et al. Using targeted symbolic execution for reducing false-positives in dataflow analysis. Proceedings of the 4th ACM SIGPLAN International Workshop on State of the Art in Program Analysis. ACM, 2015: 1--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Reps T, Schwoon S, Jha S, et al. Weighted pushdown systems and their application to interprocedural dataflow analysis. Science of Computer Programming, 2005, 58(1-2): 206--263. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An Analysis Model of Buffer Overflow Vulnerability Based on FSM

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICGDA '19: Proceedings of the 2019 2nd International Conference on Geoinformatics and Data Analysis
      March 2019
      156 pages
      ISBN:9781450362450
      DOI:10.1145/3318236

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 March 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader