DocumentCode
167632
Title
Directed symbolic execution for binary vulnerability mining
Author
Bo Wu ; Mengjun Li ; Bin Zhang ; Quan Zhang ; Chaojing Tang
Author_Institution
Sch. of Electron. Sci. & Eng., Nat. Univ. of Defence Technol., Changsha, China
fYear
2014
fDate
8-9 May 2014
Firstpage
614
Lastpage
617
Abstract
Despite more than two decades of independent, academic, and industry-related research, software vulnerabilities remain the main reason that undermine the security of our systems. Taint analysis and symbolic execution are among the most promising approaches for vulnerability detection, but either one can´t remit the problem separately. In this paper, we try to combine taint analysis and symbolic execution for binary vulnerability mining and proposed a method named directed symbolic execution. Our three-step approach firstly adopts dynamic taint analysis technology to identify the safety-related data, and then uses symbolic execution system to execute the binary software while marks those safety-related data as symbols, and finally discovers vulnerabilities with our check-model. The evaluation shows that our method can be used to detect vulnerabilities in binary software more efficiently.
Keywords
data mining; program diagnostics; security of data; software reliability; binary software; binary vulnerability mining; check-model; directed symbolic execution method; dynamic taint analysis technology; safety-related data identification; software vulnerability detection; Context; Protocols; Software; Symbolic Execution; Vulnerability detection; Vulnerability model;
fLanguage
English
Publisher
ieee
Conference_Titel
Electronics, Computer and Applications, 2014 IEEE Workshop on
Conference_Location
Ottawa, ON
Type
conf
DOI
10.1109/IWECA.2014.6845694
Filename
6845694
Link To Document