Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

Research Article

RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow

Download
742 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-23602-0_9,
        author={Yong Wang and Dawu Gu and Jianping Xu and Mi Wen and Liwen Deng},
        title={RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow},
        proceedings={Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers},
        proceedings_a={E-FORENSICS},
        year={2012},
        month={10},
        keywords={Integer Overflow Format String Overflow Buffer Overflow},
        doi={10.1007/978-3-642-23602-0_9}
    }
    
  • Yong Wang
    Dawu Gu
    Jianping Xu
    Mi Wen
    Liwen Deng
    Year: 2012
    RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow
    E-FORENSICS
    Springer
    DOI: 10.1007/978-3-642-23602-0_9
Yong Wang,*, Dawu Gu1, Jianping Xu2, Mi Wen2, Liwen Deng3
  • 1: Shanghai Jiao Tong University
  • 2: Shanghai University of Electric Power
  • 3: Shanghai Changjiang Computer Group Corporation
*Contact email: wy616@126.com

Abstract

Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Integer Checking via Buffer overflow). Our approach includes decompile execute file to assembly language; debug the execute file step into and step out; locate the overflow points and checking buffer overflow caused by integer overflow. We have implemented our approach in three buffer overflow types: format string overflow, stack overflow and heap overflow. Experiments results show that our approach is effective and efficient. We have detected more than 5 known integer overflow vulnerabilities via buffer overflow.