2021
DOI: 10.1109/access.2021.3091209
|View full text |Cite
|
Sign up to set email alerts
|

NPDHunter: Efficient Null Pointer Dereference Vulnerability Detection in Binary

Abstract: Null pointer dereference (NPD) is a widespread vulnerability that occurs whenever an executing program attempts to dereference a null pointer. NPD vulnerability can be exploited by hackers to maliciously crash a process to cause a denial of service or execute an arbitrary code under specific conditions. This typical taintstyle vulnerability requires an accurate data dependency analysis to trace whether a source is propagated to a sensitive sink without proper sanitization. The primary challenge in data depende… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Furthermore, the attacker exploits the lack of memory protection on the ERP to gain control over the computer's memory, where the ERP is running. This allows the attacker to corrupt the memory and carry out a Null Pointer Dereference attack [142], another form of memory-based attack that can crash the ERP and facilitate a successful DoS attack. The vulnerability exploited here is the lack of memory protection.…”
Section: Hacking Scenario On Application Layermentioning
confidence: 99%
“…Furthermore, the attacker exploits the lack of memory protection on the ERP to gain control over the computer's memory, where the ERP is running. This allows the attacker to corrupt the memory and carry out a Null Pointer Dereference attack [142], another form of memory-based attack that can crash the ERP and facilitate a successful DoS attack. The vulnerability exploited here is the lack of memory protection.…”
Section: Hacking Scenario On Application Layermentioning
confidence: 99%
“…In recent years, Internet security problems have occurred frequently, and various cloud servers have run into crisis, seriously reducing the network credibility. According to the 2014 Internet Security Threat Report, more than 70% of websites nationwide have server vulnerabilities, of which 20% are high-risk vulnerabilities [12][13][14][15]. Although relevant researchers have designed several conventional dual end vulnerability detection methods based on the characteristics of dual end servers, most detection methods need to use the crawler detection algorithm to obtain detection parameters, which is difficult to effectively connect with the form URL.…”
Section: Introductionmentioning
confidence: 99%