An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code


Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

This article proposes an approach to identifying integer overflow vulnerabilities in software represented by the executable code of x86 architecture. The approach is based on symbolic code execution and initially twofold representation of memory cells. A truncated control transfer graph is constructed from the machine code of the program, the paths in which are layer-by-layer checked for the feasibility of the vulnerability conditions. The proposed methods were implemented in practice and experimentally tested on the various code samples.

About the authors

R. A. Demidov

Peter the Great St.Petersburg Polytechnic University

Author for correspondence.
Email: rd@ibks.spbstu.ru
Russian Federation, Saint-Petersburg, 195251

A. I. Pechenkin

Peter the Great St.Petersburg Polytechnic University

Author for correspondence.
Email: pechenkin@ibks.spbstu.ru
Russian Federation, Saint-Petersburg, 195251

P. D. Zegzhda

Peter the Great St.Petersburg Polytechnic University

Email: pechenkin@ibks.spbstu.ru
Russian Federation, Saint-Petersburg, 195251

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2018 Allerton Press, Inc.