Font Size: a A A

Dynamic Detection Of Buffer-overflow Vulnerability In Binary Environment

Posted on:2009-05-23Degree:MasterType:Thesis
Country:ChinaCandidate:C XiaFull Text:PDF
GTID:2178360242977087Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The paper firstly works over four main kinds of buffer overrun vulnerabilities: Stack based overflows, heap-and bss-based overflows, returning into libc and format string overruns. Secondly, it introduces the typical methods used in dynamic and static buffer-overflow vulnerability detection, Wagner Method (static detection) and StackShield Method (dynamic detection). Then, the paper proposed a new way to find buffer overflow vulnerabilities in binary environment.Combining the dynamic and static analysis, it makes further detection of buffer overflow vulnerabilities. Static methods mainly deal with the structure of the executable binary file, including the function call relations, the internal structure (loop and if branch) of a function and the properties of its stack frame. Dynamic emulation provides a virtual run-time environment, which enables the program to combine its static properties while virtually being executed, and then we can get the function's signature: the semantic results on buffer manipulation. Finally, we can judge the results to determine whether there is a buffer-overflow vulnerability.
Keywords/Search Tags:function signature, dynamic emulation, semantic operations
PDF Full Text Request
Related items