DocumentCode :
3175531
Title :
Classification of Static Analysis-Based Buffer Overflow Detectors
Author :
Shahriar, Hossain ; Zulkernine, Mohammad
Author_Institution :
Sch. of Comput., Queen´´s Univ., Kingston, ON, Canada
fYear :
2010
fDate :
9-11 June 2010
Firstpage :
94
Lastpage :
101
Abstract :
Buffer overflow is one of the most dangerous exploitable vulnerabilities in released software or programs. Many approaches are applied to mitigate buffer overflow (BOF) vulnerabilities such as testing and monitoring. However, BOF vulnerabilities are discovered in programs frequently which might be exploited to crash programs and execute arbitrary injected code. Static analysis is a popular approach for detecting BOF vulnerabilities before releasing programs. Many static analysis-based approaches are currently used in practice. However, there is no detailed classification of these approaches to understand their common characteristics, objectives, and limitations. In this paper, we classify static analysis-based BOF vulnerability detection approaches based on six features: inference technique, analysis sensitivity, analysis granularity, soundness, completeness, and language. We then classify static inference techniques into four types: tainted data flow, constraint, annotation, and string pattern matching. Moreover, we compare the approaches in terms of effectiveness, scalability, and required manual effort. The classification will enable researchers to differentiate among existing analysis approaches. We develop some guidelines to help in choosing approaches and building tools suitable for practitioners need.
Keywords :
inference mechanisms; program diagnostics; program testing; analysis granularity; analysis sensitivity; arbitrary injected code; building tools; software monitoring; software testing; static analysis-based BOF vulnerability detection; static analysis-based buffer overflow detectors; static inference techniques; string pattern matching; tainted data flow; Buffer overflow; Computer bugs; Computer crashes; Data security; Detectors; Guidelines; Monitoring; Pattern matching; Scalability; Vehicle crash testing; Static analysis; buffer overflow; completeness; sensitivity; soundness;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Secure Software Integration and Reliability Improvement Companion (SSIRI-C), 2010 Fourth International Conference on
Conference_Location :
Singapore
Print_ISBN :
978-1-4244-7644-2
Type :
conf
DOI :
10.1109/SSIRI-C.2010.28
Filename :
5521566
Link To Document :
بازگشت