Proceedings 2018 Workshop on Binary Analysis Research 2018
DOI: 10.14722/bar.2018.23019
|View full text |Cite
|
Sign up to set email alerts
|

Saluki: Finding Taint-style Vulnerabilities with Static Property Checking

Abstract: We present Saluki, a new tool for checking taintstyle (data dependence) security properties in binary code. Saluki provides a domain specific language for expressing taint-based policies. Saluki can find vulnerabilities in real programs for a number of CWE types, including those for command injection, weak PRNG seeds, and missing sanitization checks such as SQL escape routines or checks on buffer lengths. Saluki includes two new ideas in binary program analysis. First, Saluki uses µflux, a new static analysis … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 22 publications
(15 citation statements)
references
References 30 publications
0
15
0
Order By: Relevance
“…As mentioned in [11], the main limitation of an emulatorbased approach is that it is difficult to emulate all values in real-word binaries for the kernel and library files. There are no initialization inputs for the kernel and library function analysis; therefore, the emulator usually generates a random input for emulation.…”
Section: A Vulnerability Detection In Binarymentioning
confidence: 99%
See 2 more Smart Citations
“…As mentioned in [11], the main limitation of an emulatorbased approach is that it is difficult to emulate all values in real-word binaries for the kernel and library files. There are no initialization inputs for the kernel and library function analysis; therefore, the emulator usually generates a random input for emulation.…”
Section: A Vulnerability Detection In Binarymentioning
confidence: 99%
“…To the best of our knowledge, cwe_checker [8] and baptoolkit [9] are the state-of-the-art binary vulnerability detection tools. Similarly, Dtaint [10] (only supports ARM32 architecture) and Saluki [11] proposed a generic approach for taint-style vulnerability detection. Unfortunately, both Dtaint [10] and Saluki [10] are not specific to NPD detection and cannot be used to detect an NPD vulnerability directly.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast, other researchers study the security of source code, and many static [6], [8], [10], [11] and dynamic [9] techniques have been proposed to detect vulnerabilities automatically. Gotovchits et al [6] detect the vulnerability in binary-level. They develop a domain-specific language to express security properties and first use µflux technique to generate data dependence facts.…”
Section: A Detecting Taint-style Vulnerabilitymentioning
confidence: 99%
“…Researchers have proposed a variety of static(e.g., [6], [8], [10], [11]), and dynamic [9] techniques to detect taint-style vulnerabilities. For example, Gotovchits et al [6] apply the novel technique named µflux to check the taint-style security properties in binary code, and finds 0-day vulnerabilities in COTS x86, x86-64, and ARM software. More recently, pattern-based methods ( [2], [3], [7]) have been provided to…”
Section: Introductionmentioning
confidence: 99%