跳到主要导航 跳到搜索 跳到主要内容

Automated detection of code vulnerabilities based on program analysis and model checking

  • Lei Wang*
  • , Qiang Zhang
  • , Peng Chao Zhao
  • *此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

Ensuring the correctness and reliability of software systems is one of the main problems in software development. Model checking, a static analysis method, is preponderant in improving the precision of vulnerabilities detection. However, when applied to buffer overflow and other bugs, it is hard to automatically construct the model for detecting the vulnerabilities. To address this problem we propose an approach that combines constraint based analysis and model checking together. We trace the memory size of buffer-related variables and instrument the code with corresponding constraint assertions before the potential vulnerable points by constraint based analysis. Then the problem of detecting vulnerabilities is converted into the problem of detecting vulnerabilities to verifying the reach ability of these assertions by model checking. In order to reduce the cost of model checking, program slicing is introduced to reduce the code size. CodeAuditor is a prototype implementation of our approach. With CodeAuditor, several yet unreported vulnerabilities are discovered in several open source software, and the performance is shown to be improved significantly with the help of program slicing.

源语言英语
主期刊名Proceedings - 8th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2008
165-173
页数9
DOI
出版状态已出版 - 2008
活动8th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2008 - Beijing, 中国
期限: 28 9月 200829 9月 2008

出版系列

姓名Proceedings - 8th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2008

会议

会议8th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2008
国家/地区中国
Beijing
时期28/09/0829/09/08

指纹

探究 'Automated detection of code vulnerabilities based on program analysis and model checking' 的科研主题。它们共同构成独一无二的指纹。

引用此