Title :
Buffer overrun prevention through component composition analysis
Author :
Llewellyn-Jones, David ; Merabti, Madjid ; Shi, Qi ; Askwith, Bob
Author_Institution :
Sch. of Comput. & Math. Sci., Liverpool John Moores Univ., UK
Abstract :
Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem. Rather than concentrate on how to prevent the use of code containing buffer overrun vulnerabilities, we look at component composition techniques that can allow vulnerable code to be executed in a safe way within a composed application. We establish how this can be determined in an automated way using formal code analysis techniques and present results from the prototype system that we have developed for this purpose.
Keywords :
buffer storage; formal verification; object-oriented programming; security of data; virtual storage; buffer overrun prevention; buffer overrun vulnerability; component composition analysis; formal code analysis; security problems; vulnerable code; Application software; Buffer overflow; Buffer storage; Data security; Information analysis; Libraries; Process design; Prototypes; Software prototyping; Testing; Buffer overrun; code analysis; component composition; security;
Conference_Titel :
Computer Software and Applications Conference, 2005. COMPSAC 2005. 29th Annual International
Print_ISBN :
0-7695-2413-3
DOI :
10.1109/COMPSAC.2005.54