Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security 2015
DOI: 10.1145/2714576.2714605
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability

Abstract: Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerabilities can be exploited by attackers to cause severe damages to computer systems. In this paper, we present the design and implementation of IntTracker, an efficient dynamic tracking technique for detecting IO2BO vulnerabilities in C/C++ programs. IntTracker utilizes a static taint analysis to select potential overflow sites that are integer operations along critical paths, from sources that are program points reading values from users, to sinks that are mem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…IntPatch [44] and IntTracker [38] insert overflow checks only at operations that they can statically determine (via type or static analysis) may flow to memory allocations. They argue that such operations do not have benign overflows.…”
Section: Related Workmentioning
confidence: 99%
“…IntPatch [44] and IntTracker [38] insert overflow checks only at operations that they can statically determine (via type or static analysis) may flow to memory allocations. They argue that such operations do not have benign overflows.…”
Section: Related Workmentioning
confidence: 99%
“…Their method is based on differential privacy. Sanchez et al [17] focused on improving sanitization of textual documents. Their approach automatically finds sensitive terms in text documents and sanitizes them.…”
Section: Related Workmentioning
confidence: 99%
“…Previous security research around traditional desktop software mainly focuses on the triggering and identification of memory corruption bugs. Buffer overflow, integer overflow, and double fetch 2‐9 are the typical representatives of this class of bugs. They primarily stem from the out‐of‐bounds use of variables in computer memory.…”
Section: Introductionmentioning
confidence: 99%