会议论文详细信息
2018 4th International Conference on Environmental Science and Material Application
Analysis to Heap Overflow Exploit in Linux with Symbolic Execution
生态环境科学;材料科学
Huang, Ning^1 ; Huang, Shuguang^1 ; Chang, Chao^1
School of Electronic Engineering, National University of Defense Technology, Hefei
230037, China^1
关键词: Buffer overflows;    Data constraints;    Detection models;    Generation technologies;    Path constraint;    Protection mechanisms;    Symbolic execution;    Trigger conditions;   
Others  :  https://iopscience.iop.org/article/10.1088/1755-1315/252/4/042100/pdf
DOI  :  10.1088/1755-1315/252/4/042100
来源: IOP
PDF
【 摘 要 】

Heap overflow is a common error of buffer overflow in Linux. The control flow of a program may be hijacked when the program satisfies several specific conditions. The existing automatic exploit generation technologies for buffer overflow find vulnerability trigger point and generate exploit by checking the control flow state. However, the heap overflow data rarely lead to a control flow hijacking as well as protection mechanisms limit the trigger condition. It is difficult to analyze the exploitability of heap overflow automatically through the existing analysis technology. For the heap overflow errors in Linux, we summarize the features of exploit on the basis of analyzing the instances, building the detection model of the exploitability of heap overflow, and proposing a method for analyzing the exploitability of heap overflow based on the model. The proposed method monitors the input data and insecurity functions of the program by using taint analysis; builds the path constraints and data constraints which satisfy the conditions of heap overflow exploit through selective symbolic execution; solves the abovementioned constraints and generates the test case automatically. All the steps of our method can be finished automatically by using the symbolic execution tool S2E. The experiments show that this method can automatically analyze and detect the exploitability of heap overflow errors.

【 预 览 】
附件列表
Files Size Format View
Analysis to Heap Overflow Exploit in Linux with Symbolic Execution 288KB PDF download
  文献评价指标  
  下载次数:15次 浏览次数:20次