Mutation-Based Testing of Integer Overflow Vulnerabilities

Integer overflow vulnerability is a kind of common software vulnerabilities, there has been no effective way to detect integer overflow vulnerabilities. Because of the lack of dynamic execution, static analysis can not determine the run-time distribution of memory, and may miss the detection of poss...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:2009 5th International Conference on Wireless Communications, Networking and Mobile Computing s. 1 - 4
Hlavní autori: Fanping Zeng, Liangliang Mao, Zhide Chen, Qing Cao
Médium: Konferenčný príspevok..
Jazyk:English
Vydavateľské údaje: IEEE 01.09.2009
Predmet:
ISBN:9781424436927, 1424436923, 1424436915, 9781424436910
ISSN:2161-9646
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Integer overflow vulnerability is a kind of common software vulnerabilities, there has been no effective way to detect integer overflow vulnerabilities. Because of the lack of dynamic execution, static analysis can not determine the run-time distribution of memory, and may miss the detection of possible security issues; source code auditing is an expensive and time consuming process. Although there has been applying mutation analysis for testing ANSI C programs, and lots of mutation operators have been designed with respect to specific questions, there are not any of operators specifically designed for integer overflow. In this paper, we propose some new mutation operators to force the generation of adequate test data set for integer overflow vulnerabilities. The results indicate that the proposed operators are effective for detecting integer overflow vulnerabilities.
AbstractList Integer overflow vulnerability is a kind of common software vulnerabilities, there has been no effective way to detect integer overflow vulnerabilities. Because of the lack of dynamic execution, static analysis can not determine the run-time distribution of memory, and may miss the detection of possible security issues; source code auditing is an expensive and time consuming process. Although there has been applying mutation analysis for testing ANSI C programs, and lots of mutation operators have been designed with respect to specific questions, there are not any of operators specifically designed for integer overflow. In this paper, we propose some new mutation operators to force the generation of adequate test data set for integer overflow vulnerabilities. The results indicate that the proposed operators are effective for detecting integer overflow vulnerabilities.
Author Fanping Zeng
Liangliang Mao
Zhide Chen
Qing Cao
Author_xml – sequence: 1
  surname: Fanping Zeng
  fullname: Fanping Zeng
  organization: Dept. of Comput., Univ. of Sci. & Technol. of China, Hefei, China
– sequence: 2
  surname: Liangliang Mao
  fullname: Liangliang Mao
  organization: Dept. of Comput., Univ. of Sci. & Technol. of China, Hefei, China
– sequence: 3
  surname: Zhide Chen
  fullname: Zhide Chen
  organization: Dept. of Comput., Univ. of Sci. & Technol. of China, Hefei, China
– sequence: 4
  surname: Qing Cao
  fullname: Qing Cao
  organization: Dept. of Comput., Univ. of Sci. & Technol. of China, Hefei, China
BookMark eNpVkEFPg0AUhNfYJraVP6AX_gD43u4Ddr0pqUrShgvRY7PAo1mDYIBq_PeS2Itzmczhm2RmLRZd37EQNwghIpi7tyzN96EEMGGkQALpC-GZRCNJIhUbRZf_skwWYiUxxsDEFC_Feka1QdSor4Q3ju8wiyJpgFbifn-a7OT6Lni0I9d-wePkuqPfN37WTXzkwc-_eGja_tt_PbUdD7Z0rZscj9di2dh2ZO_sG1E8bYv0Jdjlz1n6sAucgSnASmnARkUEtTVaRmQTWZJhTWWFpZZKUhXVEMvEQq2ViZJKmxigQlLzIrURt3-1jpkPn4P7sMPP4fyE-gW6mU0o
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/WICOM.2009.5302048
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781424436934
1424436931
EndPage 4
ExternalDocumentID 5302048
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
M43
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-1c3801f3540da98254a72b49e84bc1b82324c5d0627a0d83957c89600c1434243
IEDL.DBID RIE
ISBN 9781424436927
1424436923
1424436915
9781424436910
ISSN 2161-9646
IngestDate Wed Aug 27 01:50:33 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2008911818
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-1c3801f3540da98254a72b49e84bc1b82324c5d0627a0d83957c89600c1434243
PageCount 4
ParticipantIDs ieee_primary_5302048
PublicationCentury 2000
PublicationDate 2009-Sept.
PublicationDateYYYYMMDD 2009-09-01
PublicationDate_xml – month: 09
  year: 2009
  text: 2009-Sept.
PublicationDecade 2000
PublicationTitle 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing
PublicationTitleAbbrev WICOM
PublicationYear 2009
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000452904
ssj0001764321
ssj0003177788
Score 1.4358219
Snippet Integer overflow vulnerability is a kind of common software vulnerabilities, there has been no effective way to detect integer overflow vulnerabilities....
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Buffer overflow
Computer languages
Genetic mutations
Runtime
Security
Software testing
Title Mutation-Based Testing of Integer Overflow Vulnerabilities
URI https://ieeexplore.ieee.org/document/5302048
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8JAEJ4A8aAXH2B8pwePrnTb0t31KJFoIo8DUW6k3W4JCWkNUv37zmwLQuLFW6d76W6n_eb5DcCtFsoLO8JnCE8BC3w3wf-gwheC6mNSLmId2UbhVzEYyMlEjWpwt-mFMcbY4jNzT5c2l5_kuqBQWZsm3KDG1aEuRFj2am3iKUQNrirXwsZXBGJtBU0kI04KYcdQemjkMBUG4brPyw8V72wJnr_mgqoW3V3ZE-vuG1e131-6w37Je1k93s6cFgtTvcP_bfAIWr_9fs5og2THUDPZCRxsURU24aFflEl79oi4lzhjYufIZk6eOhRUnJmlM8SvIl3k385bsSAua1t2i454C8a9p3H3mVVzF9hcuSvGtY-wlVJAKIkUeZCR8OJAGRnEmseSbDDdSYjfOHITSYk-LdERcjXaXnhE_ik0sjwzZ-Dw1It0LPHscS3SXKG5IBMutTQcXSF9Dk06hOlHyawxrfZ_8fftS9gvczlU4XUFjdWyMNewp79W88_ljVWHHyFmpEQ
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT4NAEJ7UaqJefLTGtxw8imWBsrsebWza2NeBaG8NLEvTpAFTi_59Z4DWNvHijWEv7DLwzfMbgHvFpe01uWMiPLmm61gR_gclvhBUHx0zHqogbxTu8cFAjMdyVIGHdS-M1jovPtOPdJnn8qNUZRQqa9CEG9S4HdilyVllt9Y6okLk4LJ0LvIIC0e0LcGJZERKzvNBlDaaOab0XG_V6eV4kjU3BNtZsUGVi9a2bPNV_40lG-_d1rBfMF-WD7g1qSUHqvbR_7Z4DPXfjj9jtMayE6jo5BQON8gKa_DUz4q0vfmMyBcZPvFzJFMjjQ0KK071whjidxHP02_jLZsTm3VeeIuueB389ovf6pjl5AVzJq2lyZSDwBVTSCgKJPmQAbdDV2rhhoqFgqww1YyI4TiwIkGpPiXQFbIUWl94RM4ZVJM00edgsNgOVCjw7HEtUEyiwSAiJpTQDJ0hdQE1OoTJR8GtMSn3f_n37TvY7_j93qTXHbxewUGR2aF6r2uoLheZvoE99bWcfS5uc9X4AfEgp40
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+5th+International+Conference+on+Wireless+Communications%2C+Networking+and+Mobile+Computing&rft.atitle=Mutation-Based+Testing+of+Integer+Overflow+Vulnerabilities&rft.au=Fanping+Zeng&rft.au=Liangliang+Mao&rft.au=Zhide+Chen&rft.au=Qing+Cao&rft.date=2009-09-01&rft.pub=IEEE&rft.isbn=9781424436927&rft.issn=2161-9646&rft.spage=1&rft.epage=4&rft_id=info:doi/10.1109%2FWICOM.2009.5302048&rft.externalDocID=5302048
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2161-9646&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2161-9646&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2161-9646&client=summon