
Buffer Overflow Vulnerability Detection Based on Unsafe Function Invocation
Author(s) -
Xianda Zhao,
Shuguang Huang,
Zulie Pan,
Hui Huang
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1549/2/022064
Subject(s) - buffer overflow , vulnerability (computing) , computer science , invocation , code (set theory) , function (biology) , buffer (optical fiber) , computer security , software , operating system , programming language , set (abstract data type) , evolutionary biology , sociology , anthropology , biology , telecommunications
Buffer overflow vulnerabilities are widespread in software programs and pose a serious security threat. In order to effectively mitigate buffer vulnerabilities, we proposed a buffer overflow vulnerability detection technique based on unsafe function invocation. By extracting the typical characteristics of the insecure function call operation, a vulnerability code characteristic model is constructed, and the model is used as a guide to use the data flow analysis method for vulnerability detection. Experimental results show that our method can effectively detect buffer overflow problems caused by unsafe function invocation in programs.