首页> 外文期刊>IEICE transactions on information and systems >Automatic Prevention of Buffer Overflow Vulnerability Using Candidate Code Generation
【24h】

Automatic Prevention of Buffer Overflow Vulnerability Using Candidate Code Generation

机译:使用候选代码生成自动防止缓冲区溢出漏洞

获取原文
           

摘要

The security of a software program critically depends on the prevention of vulnerabilities in the source code; however, conventional computer programs lack the ability to identify vulnerable code in another program. Our research was aimed at developing a technique capable of generating substitution code for the detection of buffer overflow vulnerability in C/C++ programs. The technique automatically verifies and sanitizes code instrumentation by comparing the result of each candidate variable with that expected from the input data. Our results showed that statements containing buffer overflow vulnerabilities could be detected and prevented by using a substitution variable and by sanitizing code vulnerabilities based on the size of the variables. Thus, faults can be detected prior to execution of the statement, preventing malicious access. Our approach is particularly useful for enhancing software security monitoring, and for designing retrofitting techniques in applications.
机译:软件程序的安全性在很大程度上取决于对源代码中的漏洞的预防。但是,常规的计算机程序缺乏识别另一个程序中易受攻击的代码的能力。我们的研究旨在开发一种能够生成替换代码以检测C / C ++程序中的缓冲区溢出漏洞的技术。该技术通过将每个候选变量的结果与输入数据的预期结果进行比较,来自动验证和清除代码检测。我们的结果表明,可以通过使用替换变量并根据变量的大小清除代码漏洞来检测和阻止包含缓冲区溢出漏洞的语句。因此,可以在执行语句之前检测到错误,从而防止恶意访问。我们的方法对于增强软件安全性监视以及设计应用程序中的改装技术特别有用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号