An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code


如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

This article proposes an approach to identifying integer overflow vulnerabilities in software represented by the executable code of x86 architecture. The approach is based on symbolic code execution and initially twofold representation of memory cells. A truncated control transfer graph is constructed from the machine code of the program, the paths in which are layer-by-layer checked for the feasibility of the vulnerability conditions. The proposed methods were implemented in practice and experimentally tested on the various code samples.

作者简介

R. Demidov

Peter the Great St.Petersburg Polytechnic University

编辑信件的主要联系方式.
Email: rd@ibks.spbstu.ru
俄罗斯联邦, Saint-Petersburg, 195251

A. Pechenkin

Peter the Great St.Petersburg Polytechnic University

编辑信件的主要联系方式.
Email: pechenkin@ibks.spbstu.ru
俄罗斯联邦, Saint-Petersburg, 195251

P. Zegzhda

Peter the Great St.Petersburg Polytechnic University

Email: pechenkin@ibks.spbstu.ru
俄罗斯联邦, Saint-Petersburg, 195251

补充文件

附件文件
动作
1. JATS XML

版权所有 © Allerton Press, Inc., 2018