Improving guide-based vulnerability detection with hybrid symbolic execution

Yongji Ouyang, Shuai Zeng, Chao Yang, Qingxian Wang
{"title":"Improving guide-based vulnerability detection with hybrid symbolic execution","authors":"Yongji Ouyang, Shuai Zeng, Chao Yang, Qingxian Wang","doi":"10.1109/ICSAI.2014.7009438","DOIUrl":null,"url":null,"abstract":"Symbolic Execution is a key and useful technology in current refinement software test, but there still exists some problems such as space explosion. In order to mitigate this problem and improve the ability for detecting vulnerabilities, this paper presents the improving guide-based vulnerability detection with hybrid symbolic execution, which aims to test suspicious objects. This method conducts path traversal with a hybrid symbolic execution model, which alternates between dynamic and static symbolic execution, and verify whether it is vulnerability through summarizing the characteristics of vulnerabilities and generating a constraint expression. Experimental result shows that this method can successfully detect errors in 56 seconds, which exceeds any other modern mainstream symbolic execution tools including CUTE, KLEE, S2E and Cloud9. Compared with CUTE, this method alleviates the problem of space explosion. Besides, this papaer successfully verifies the vulnerabilities of OpenSSL and some other commonly used software.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSAI.2014.7009438","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Symbolic Execution is a key and useful technology in current refinement software test, but there still exists some problems such as space explosion. In order to mitigate this problem and improve the ability for detecting vulnerabilities, this paper presents the improving guide-based vulnerability detection with hybrid symbolic execution, which aims to test suspicious objects. This method conducts path traversal with a hybrid symbolic execution model, which alternates between dynamic and static symbolic execution, and verify whether it is vulnerability through summarizing the characteristics of vulnerabilities and generating a constraint expression. Experimental result shows that this method can successfully detect errors in 56 seconds, which exceeds any other modern mainstream symbolic execution tools including CUTE, KLEE, S2E and Cloud9. Compared with CUTE, this method alleviates the problem of space explosion. Besides, this papaer successfully verifies the vulnerabilities of OpenSSL and some other commonly used software.
使用混合符号执行改进基于指南的漏洞检测
符号执行技术是当前精细化软件测试的一项关键技术,但仍存在空间爆炸等问题。为了缓解这一问题,提高漏洞检测能力,本文提出了一种改进的基于制导的混合符号执行漏洞检测方法,旨在检测可疑对象。该方法采用动态符号执行和静态符号执行交替的混合符号执行模型进行路径遍历,通过总结漏洞特征并生成约束表达式来验证是否为漏洞。实验结果表明,该方法可以在56秒内成功检测到错误,超过了目前主流的符号执行工具,包括CUTE、KLEE、S2E和Cloud9。与CUTE相比,该方法减轻了空间爆炸的问题。此外,本文还成功验证了OpenSSL和其他一些常用软件的漏洞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信