z-logo
open-access-imgOpen Access
Buffer Overflow Vulnerability Detection Based on Unsafe Function Invocation
Author(s) -
Xianda Zhao,
Shuguang Huang,
Zulie Pan,
Hui Huang
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1549/2/022064
Subject(s) - buffer overflow , vulnerability (computing) , computer science , invocation , code (set theory) , function (biology) , buffer (optical fiber) , computer security , software , operating system , programming language , set (abstract data type) , evolutionary biology , sociology , anthropology , biology , telecommunications
Buffer overflow vulnerabilities are widespread in software programs and pose a serious security threat. In order to effectively mitigate buffer vulnerabilities, we proposed a buffer overflow vulnerability detection technique based on unsafe function invocation. By extracting the typical characteristics of the insecure function call operation, a vulnerability code characteristic model is constructed, and the model is used as a guide to use the data flow analysis method for vulnerability detection. Experimental results show that our method can effectively detect buffer overflow problems caused by unsafe function invocation in programs.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here