The Study on Integer Overflow Vulnerability Detection in Binary Executables Based Upon Genetic Algorithm

被引:0
作者
Cui, Baojiang [1 ]
Liang, Xiaobing [1 ]
Wang, Jianxin [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp, Beijing 100876, Peoples R China
[2] Beijing Forestry Univ, Sch Informat Sci & Technol, Beijing 100083, Peoples R China
来源
FOUNDATIONS OF INTELLIGENT SYSTEMS (ISKE 2011) | 2011年 / 122卷
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Fuzzing technology; Integer overflows vulnerability; Binary executables; Static analysis; Genetic algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The automatic identification of security vulnerabilities in the binary code is still a young but important research area for the security researchers. In recent years, the number of identified integer overflow vulnerabilities has been increasing rapidly. In this paper, we present a smart software vulnerability detection technology, which is used for the identification of integer overflow vulnerabilities in the binary executables. The proposed algorithm is combined with debugger module, static analysis module and genetic algorithm module. We use the fitness function to guide the generation of the tested data and use static analysis to provide the information that the genetic module needs. Theory analyses and experiment results indicate that the detection technology based upon genetic algorithm can identify the exceptions in the object program and is more efficient than the common Fuzzing technology.
引用
收藏
页码:259 / +
页数:3
相关论文
共 8 条
  • [1] [Anonymous], 1995, Technical Report
  • [2] Detecting buffer overflow via automatic test input data generation
    Del Grosso, C.
    Antoniol, G.
    Merlo, E.
    Galinier, P.
    [J]. COMPUTERS & OPERATIONS RESEARCH, 2008, 35 (10) : 3125 - 3143
  • [3] Golberg D. E., 1989, GENETIC ALGORITHMS S, V1989, P36
  • [4] Holland J.H., 1992, Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control and Artificial Intelligence
  • [5] AN EMPIRICAL-STUDY OF THE RELIABILITY OF UNIX UTILITIES
    MILLER, BP
    FREDRIKSEN, L
    SO, B
    [J]. COMMUNICATIONS OF THE ACM, 1990, 33 (12) : 32 - 43
  • [6] Automated vulnerability analysis: Leveraging control flow for evolutionary input crafting
    Sparks, Sherri
    Embleton, Shawn
    Cunningham, Ryan
    Zou, Cliff
    [J]. TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 477 - 486
  • [7] Tracey N, 2000, SOFTWARE PRACT EXPER, V30, P61, DOI 10.1002/(SICI)1097-024X(200001)30:1<61::AID-SPE292>3.0.CO
  • [8] 2-9