DocumentCode
3517652
Title
An Evolutionary Computing Approach for Hunting Buffer Overflow Vulnerabilities: A Case of Aiming in Dim Light
Author
Rawat, Sanjay ; Mounier, Laurent
Author_Institution
Verimag Lab., Univ. Joseph Fourier, Gières, France
fYear
2010
fDate
28-29 Oct. 2010
Firstpage
37
Lastpage
45
Abstract
We propose an approach in the form of a light weight smart fuzzer to generate string based inputs to detect buffer overflow vulnerability in C code. The approach is based on an evolutionary algorithm which is a combination of genetic algorithm and evolutionary strategies. In this preliminary work we focus on the problem that there are constraints on string inputs that must be satisfied in order to reach the vulnerable statement in the code and we have very little or no knowledge about them. Unlike other similar approaches, our approach is able to generate such inputs without knowing these constraints explicitly. It learns these constraints automatically while generating inputs dynamically by executing the vulnerable program. We provide few empirical results on a benchmarking dataset-Verisec suite of programs.
Keywords
benchmark testing; genetic algorithms; program testing; software reliability; C code; Verisec suite; buffer overflow vulnerabilities; dim light; evolutionary computing approach; evolutionary strategies; genetic algorithm; light weight smart fuzzer; Evolutionary computation; Gallium; Instruments; Performance analysis; Runtime; Security; Software; buffer overflow; data- and control-flow; evolutionary algorithm; fuzzing; vulnerability;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Network Defense (EC2ND), 2010 European Conference on
Conference_Location
Berlin
Print_ISBN
978-1-4244-9377-7
Type
conf
DOI
10.1109/EC2ND.2010.14
Filename
5663319
Link To Document