DocumentCode
3258231
Title
Rule-Based Source Level Patching of Buffer Overflow Vulnerabilities
Author
Shahriar, Hossain ; Haddad, Hisham M.
Author_Institution
Dept. of Comput. Sci., Kennesaw State Univ., Kennesaw, GA, USA
fYear
2013
fDate
15-17 April 2013
Firstpage
627
Lastpage
632
Abstract
Buffer overflow (BOF) is a notorious vulnerability that leads to non-secure software. The presence of BOF hampers essential security objectives - confidentiality, integrity and availability. A BOF might result in neigh boring data values corruption, application core dumps, etc. This research focuses on the detection and patching of BOF vulnerabilities. The detection includes identifying programming elements that might cause BOF, such as limitations due to languages, associated libraries, and logical errors. This work presents several code patterns that include simple (one statement) and complex (multiple statements) forms of BOF. For prevention, we propose eight rules to fix vulnerable code to avoid BOF without modifying the application functionality. The proposed approach addresses BOF issues not only at the unit level but also at the integrated level by passing buffer length information. The proposed rules are evaluated with 14 benchmark applications that have known BOF vulnerabilities. The results show that the proposed rules are effective in detecting and patching BOF without altering original functionalities of applications. The performance overhead due to the application of the proposed patching rules is negligible.
Keywords
buffer storage; data integrity; knowledge based systems; security of data; software reliability; BOF detection; BOF patching; BOF vulnerabilities; application core dumps; buffer length information passing; buffer overflow vulnerabilities; code pattern; data availability; data confidentiality; data integrity; integrated level; neighboring data value corruption; nonsecure software; notorious vulnerability; rule-based source level patching; security objectives; unit level; Benchmark testing; Buffer overflows; Indexes; Libraries; Runtime; Security; Switches; Buffer overflow; Rule-based patching; Software vulnerabilities;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Technology: New Generations (ITNG), 2013 Tenth International Conference on
Conference_Location
Las Vegas, NV
Print_ISBN
978-0-7695-4967-5
Type
conf
DOI
10.1109/ITNG.2013.96
Filename
6614376
Link To Document