Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software vulnerability detection method based on pointer analysis

A software vulnerability and pointer analysis technology, applied in the field of software vulnerability detection, can solve the problems of insufficient use of pointer variable information and inaccurate recovery of complex data types, etc., to achieve the effect of improving security and improving accuracy

Inactive Publication Date: 2014-09-03
NANJING UNIV
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, for the recovery of complex data types, most of them use simple type derivation or the method of analyzing the access interval of complex data types, which does not make full use of pointer variable information, making the recovery of complex data types inaccurate.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software vulnerability detection method based on pointer analysis
  • Software vulnerability detection method based on pointer analysis
  • Software vulnerability detection method based on pointer analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] like figure 1 As shown, Valgrind is an instrumentation software that enables dynamic analysis of executable programs. Instrumentation of executable programs is accomplished with this platform. The instrumented program is executed, the instrumented code is executed, and data type recovery and software vulnerability detection are implemented. Start the Valgrind program, specify the instrumentation operation to be used, the program to be instrumented, the library function query file and the output file, etc., and then the corresponding instrumentation operation can be realized.

[0018] The three main instrumentation operations are recovery of basic data types, recovery of complex data types, and vulnerability detection. For the instrumentation of basic data type recovery, the input file is the executable program to be instrumented. The instrumentation operation is: insert the type collection code after the instructions belonging to the type-sensitive instruction set, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A software vulnerability detection method based on pointer analysis includes the following steps that with the help of instrumentation software, three main instrumentation operations of basic data type recovery, complex data type recovery and vulnerability detection are respectively finished, wherein the instrumentation operation of basic data type recovery includes the processes that type collection codes are inserted behind instructions belonging to a type sensitive instruction set, and then propagation codes of different types are inserted according to different assembly instructions; the instrumentation operation of complex data type recovery includes the processes that pointer collection codes are inserted behind a memory application instruction set, pointer analysis codes are inserted according to different assembly instructions, and then complex data types are recovered in the pointer analysis process; the instrumentation operation of vulnerability detection includes the processes that pollution marking codes are inserted to external input positions of programs, stain spreading codes are inserted according to assembly instructions, and security detection codes are inserted to security sensitive points.

Description

technical field [0001] The invention relates to a software vulnerability detection method related to complex data types, in particular to a software vulnerability detection method based on pointer analysis. Background technique [0002] A software vulnerability is a system vulnerable to attack that affects the availability of the system. Among software vulnerabilities, vulnerabilities related to complex data types account for a larger proportion, and a larger proportion of vulnerabilities that can be exploited to achieve attacks. Through the analysis and detection of the program, it is a common method to find and eliminate software vulnerabilities. To achieve effective vulnerability detection for executable programs, recovery of complex data types is the key. At present, for the recovery of complex data types, simple type deduction or analysis of the access interval of complex data types are mostly used, and the pointer variable information is not fully utilized, which mak...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/36
Inventor 曾庆凯李会朋
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products