CodeAuditor: A Vulnerability Detection Framework Based on Constraint Analysis and Model Checking
Open source applications have flourished over recent years. Meanwhile security vulnerabilities in such applications have grown. Since manual code auditing is error-prone, time-consuming and costly, automatic solutions have become necessary. In this paper we address program vulnerabilities by static...
Gespeichert in:
| Veröffentlicht in: | 2009 International Conference on Management and Service Science S. 1 - 4 |
|---|---|
| Hauptverfasser: | , , , , |
| Format: | Tagungsbericht |
| Sprache: | Englisch |
| Veröffentlicht: |
IEEE
01.09.2009
|
| Schlagworte: | |
| ISBN: | 1424446384, 9781424446384 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Open source applications have flourished over recent years. Meanwhile security vulnerabilities in such applications have grown. Since manual code auditing is error-prone, time-consuming and costly, automatic solutions have become necessary. In this paper we address program vulnerabilities by static code analysis. First, we use flow-insensitive and interprocedural constraint-based analysis to extract the vulnerability detection model from the source code. Second, we employ model checking to solve the model. In addition, we do alias analysis to improve the correctness and precision of the detection model. The presented concepts are targeted at the general class of buffer-related vulnerabilities and can be applied to the detection of vulnerability types such as buffer overflow, format string attack, and code injection. CodeAuditor, the prototype implementation of our methods, is targeted at detecting buffer overflow vulnerabilities in C source code. It can be regarded as a vulnerability framework in which a variety of analysis and model checking tools can be incorporated. With this tool, 18 previously unknown vulnerabilities in six open source applications were discovered and the observed false positive rate was at around 23%. |
|---|---|
| AbstractList | Open source applications have flourished over recent years. Meanwhile security vulnerabilities in such applications have grown. Since manual code auditing is error-prone, time-consuming and costly, automatic solutions have become necessary. In this paper we address program vulnerabilities by static code analysis. First, we use flow-insensitive and interprocedural constraint-based analysis to extract the vulnerability detection model from the source code. Second, we employ model checking to solve the model. In addition, we do alias analysis to improve the correctness and precision of the detection model. The presented concepts are targeted at the general class of buffer-related vulnerabilities and can be applied to the detection of vulnerability types such as buffer overflow, format string attack, and code injection. CodeAuditor, the prototype implementation of our methods, is targeted at detecting buffer overflow vulnerabilities in C source code. It can be regarded as a vulnerability framework in which a variety of analysis and model checking tools can be incorporated. With this tool, 18 previously unknown vulnerabilities in six open source applications were discovered and the observed false positive rate was at around 23%. |
| Author | Qiang Zhang Lei Wang Pengchao Zhao Jianan Wang Gui Chen |
| Author_xml | – sequence: 1 surname: Lei Wang fullname: Lei Wang organization: Comput. Sch., Beijing Univ. of Aeronaut. & Astronaut., Beijing, China – sequence: 2 surname: Gui Chen fullname: Gui Chen organization: Comput. Sch., Beijing Univ. of Aeronaut. & Astronaut., Beijing, China – sequence: 3 surname: Jianan Wang fullname: Jianan Wang organization: Comput. Sch., Beijing Univ. of Aeronaut. & Astronaut., Beijing, China – sequence: 4 surname: Pengchao Zhao fullname: Pengchao Zhao organization: Comput. Sch., Beijing Univ. of Aeronaut. & Astronaut., Beijing, China – sequence: 5 surname: Qiang Zhang fullname: Qiang Zhang organization: Comput. Sch., Beijing Univ. of Aeronaut. & Astronaut., Beijing, China |
| BookMark | eNo1UNtKAzEUjGhBW_sD-pIfaM11s_FtXW-FFh9afK1pclZjt1lJUqR_74p1GDjMMAycGaKz0AVA6IqSKaVE38zqxXI5ZYToqeREMClP0FirkgomhCi4pqdo-C9KMUDD36wmgpfkHI1T-iQ9hGSqYBfore4cVHvncxdvcYVf922AaDa-9fmA7yGDzb4L-DGaHXx3cYvvTAKHe6vuQsrR-JBxFUx7SD5hExxe9I0trj_Abn14v0SDxrQJxsc7QqvHh1X9PJm_PM3qaj7xmuSJpAKostJulKDE8MJQBZpxDbw0PUtlrW64A6elcv3PRhVNyRqxaXhhBecjdP1X6wFg_RX9zsTD-jgQ_wHk5Fl8 |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICMSS.2009.5304255 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library (IEL) (UW System Shared) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9781424446391 1424446392 |
| EndPage | 4 |
| ExternalDocumentID | 5304255 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AARBI AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIE RIL |
| ID | FETCH-LOGICAL-i90t-514e17c5cb7410a36a17e9239e38a38a87cc9f3ded957d255a76f82f4bf36c433 |
| IEDL.DBID | RIE |
| ISBN | 1424446384 9781424446384 |
| IngestDate | Wed Aug 27 02:26:03 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCN | 2009904380 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-514e17c5cb7410a36a17e9239e38a38a87cc9f3ded957d255a76f82f4bf36c433 |
| PageCount | 4 |
| ParticipantIDs | ieee_primary_5304255 |
| PublicationCentury | 2000 |
| PublicationDate | 2009-Sept. |
| PublicationDateYYYYMMDD | 2009-09-01 |
| PublicationDate_xml | – month: 09 year: 2009 text: 2009-Sept. |
| PublicationDecade | 2000 |
| PublicationTitle | 2009 International Conference on Management and Service Science |
| PublicationTitleAbbrev | ICMSS |
| PublicationYear | 2009 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000452762 |
| Score | 1.4273586 |
| Snippet | Open source applications have flourished over recent years. Meanwhile security vulnerabilities in such applications have grown. Since manual code auditing is... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Application software Automatic control Buffer overflow Computer bugs Flow graphs Formal verification Instruments Pattern analysis Programming Prototypes |
| Title | CodeAuditor: A Vulnerability Detection Framework Based on Constraint Analysis and Model Checking |
| URI | https://ieeexplore.ieee.org/document/5304255 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA7b8OBJZRN_k4NH6_ojbRpvszoUdAw2xm6zSV5wIK3MTvC_9yVdJ4IXoYc2lNKmLd97L9_3PUIuFZMpooLyRKgBE5QUPOFLzFoFwoswECqnhZk98dEonc_FuEWutloYAHDkM7i2u24tX5dqbUtl_djm3nHcJm3Ok1qrta2nWGtw_LEb7RbD74o1lk7NcSOa8UX_MXueTGq7ys1Vf7VXcegy3Pvffe2T3o9Mj463AHRAWlB0yUtWahhYrUW5uqEDOlu_WWNpx4H9ondQOe5VQYcNK4veIpBpikO2eadrGVHRxquE5oWmtl_aG81eQdm6eo9Mh_fT7MHbtFHwlsKvPIyIIOAqVhKDBz-PkjzggGGdgCjNcUu5UsJEGrSIucbHyHli0tAwaaJEsSg6JJ2iLOCI0EAbYawHHHDGJIZ2eA5mYEEYCia59I9J107O4r02ylhs5uXk7-FTslsvzVjC1hnpVKs1nJMd9VktP1YX7u1-A1rtoSA |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8NAEF1qFfSk0orf7sGjsfnYdLPearS02JZCS-mtJrsTLJREYir4753dNBXBi5BDsoSQbBLezOx7bwi5lSwOEBWkJVwFmKAEYAk7xqxVILyIBFxptDCzAR-NgvlcjGvkbquFAQBDPoN7vWvW8lUm17pU1vJ17u37O2TXZ8y1S7XWtqKizcHx167UWwy_LFaZOlXHlWzGFq1-OJxMSsPKzXV_NVgx-NI9_N-dHZHmj1CPjrcQdExqkDbIa5gp6Gi1RZY_0A6drVfaWtqwYL_oExSGfZXSbsXLoo8IZYrikG7faZpGFLRyK6FRqqjumLai4RtIXVlvkmn3eRr2rE0jBWsp7MLCmAgcLn0ZY_hgR147cjhgYCfACyLcAi6lSDwFSvhc4WNEvJ0EbsLixGtL5nknpJ5mKZwS6qhEJNoFDjhjMQZ3eA7mYI7rChbz2D4jDT05i_fSKmOxmZfzv4dvyH5vOhwsBv3RywU5KBdqNH3rktSLfA1XZE9-FsuP_Nq86W_vmaRn |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+International+Conference+on+Management+and+Service+Science&rft.atitle=CodeAuditor%3A+A+Vulnerability+Detection+Framework+Based+on+Constraint+Analysis+and+Model+Checking&rft.au=Lei+Wang&rft.au=Gui+Chen&rft.au=Jianan+Wang&rft.au=Pengchao+Zhao&rft.date=2009-09-01&rft.pub=IEEE&rft.isbn=9781424446384&rft.spage=1&rft.epage=4&rft_id=info:doi/10.1109%2FICMSS.2009.5304255&rft.externalDocID=5304255 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424446384/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424446384/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424446384/sc.gif&client=summon&freeimage=true |

