Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science

Buffer Overflow Vulnerability Detection based on Format-Matching on Source Level

Authors
Xiaoyu Wang, Qiaoyan Wen, Zhao Zhang
Corresponding Author
Xiaoyu Wang
Available Online May 2014.
DOI
10.2991/lemcs-14.2014.70How to use a DOI?
Keywords
buffer overflow; rule-based detection; dynamic test; format-matching
Abstract

Buffer overflow has become the most common software vulnerability, which seriously restricts the development of the software industry. It’s very essential to find out an effective method to detect this kind of software bugs accurately. In this paper, we design an improved buffer overflow detection system. At first, our system preprocesses the source code to add some auxiliary detection symbols. Then, it scans the source code by a static detector, which uses the identifier for auxiliary detection and combines with a dynamic detection method to improve the recognition accuracy and detection capability. Finally, we make a comparison between our system and the original detection system. To assess the usefulness of this approach, several experiments are performed on a simulation system, and we can draw a conclusion that our system performs better than other detection software. The method proposed in this paper is of the important application value and can improve detection accuracy.

Copyright
© 2014, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science
Series
Advances in Intelligent Systems Research
Publication Date
May 2014
ISBN
10.2991/lemcs-14.2014.70
ISSN
1951-6851
DOI
10.2991/lemcs-14.2014.70How to use a DOI?
Copyright
© 2014, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Xiaoyu Wang
AU  - Qiaoyan Wen
AU  - Zhao Zhang
PY  - 2014/05
DA  - 2014/05
TI  - Buffer Overflow Vulnerability Detection based on Format-Matching on Source Level
BT  - Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science
PB  - Atlantis Press
SP  - 298
EP  - 301
SN  - 1951-6851
UR  - https://doi.org/10.2991/lemcs-14.2014.70
DO  - 10.2991/lemcs-14.2014.70
ID  - Wang2014/05
ER  -