• DocumentCode
    3258231
  • Title

    Rule-Based Source Level Patching of Buffer Overflow Vulnerabilities

  • Author

    Shahriar, Hossain ; Haddad, Hisham M.

  • Author_Institution
    Dept. of Comput. Sci., Kennesaw State Univ., Kennesaw, GA, USA
  • fYear
    2013
  • fDate
    15-17 April 2013
  • Firstpage
    627
  • Lastpage
    632
  • Abstract
    Buffer overflow (BOF) is a notorious vulnerability that leads to non-secure software. The presence of BOF hampers essential security objectives - confidentiality, integrity and availability. A BOF might result in neigh boring data values corruption, application core dumps, etc. This research focuses on the detection and patching of BOF vulnerabilities. The detection includes identifying programming elements that might cause BOF, such as limitations due to languages, associated libraries, and logical errors. This work presents several code patterns that include simple (one statement) and complex (multiple statements) forms of BOF. For prevention, we propose eight rules to fix vulnerable code to avoid BOF without modifying the application functionality. The proposed approach addresses BOF issues not only at the unit level but also at the integrated level by passing buffer length information. The proposed rules are evaluated with 14 benchmark applications that have known BOF vulnerabilities. The results show that the proposed rules are effective in detecting and patching BOF without altering original functionalities of applications. The performance overhead due to the application of the proposed patching rules is negligible.
  • Keywords
    buffer storage; data integrity; knowledge based systems; security of data; software reliability; BOF detection; BOF patching; BOF vulnerabilities; application core dumps; buffer length information passing; buffer overflow vulnerabilities; code pattern; data availability; data confidentiality; data integrity; integrated level; neighboring data value corruption; nonsecure software; notorious vulnerability; rule-based source level patching; security objectives; unit level; Benchmark testing; Buffer overflows; Indexes; Libraries; Runtime; Security; Switches; Buffer overflow; Rule-based patching; Software vulnerabilities;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Technology: New Generations (ITNG), 2013 Tenth International Conference on
  • Conference_Location
    Las Vegas, NV
  • Print_ISBN
    978-0-7695-4967-5
  • Type

    conf

  • DOI
    10.1109/ITNG.2013.96
  • Filename
    6614376