Applying Dataflow Analysis to Detecting Software Vulnerability

In this paper, we propose a software vulnerability checker which takes rules describing vulnerability patterns and a source program as input and detects locations and paths of the patterns in the program. Simple and flow patterns for vulnerabilities are described as rules in the specification langua...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Hyunha Kim, Tae-Hyoung Choi, Seung-Cheol Jung, Hyoung-Cheol Kim, Oukseh Lee, Kyung-Goo Doh
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 258
container_issue
container_start_page 255
container_title
container_volume 1
creator Hyunha Kim
Tae-Hyoung Choi
Seung-Cheol Jung
Hyoung-Cheol Kim
Oukseh Lee
Kyung-Goo Doh
description In this paper, we propose a software vulnerability checker which takes rules describing vulnerability patterns and a source program as input and detects locations and paths of the patterns in the program. Simple and flow patterns for vulnerabilities are described as rules in the specification language we designed. The lightweight control and data flow analysis is necessary to detect flow patterns. Newly discovered vulnerability patterns can easily be added to the existing rules. We implement the detector in three parts: a pattern matcher which finds locations of vulnerabilities in source program, a flow graph constructor which extracts the control flow and data flow from the program, and a flow analyzer which finds program's vulnerable execution paths.
doi_str_mv 10.1109/ICACT.2008.4493756
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4493756</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4493756</ieee_id><sourcerecordid>4493756</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-9eeccaa6f5afc332614368954d92f7b874885e2f408cba16343b30e13f0c0e093</originalsourceid><addsrcrecordid>eNotj81KxDAURgMqOI7zArrpC7Te9CZpshFKxz8YcGFxO6TxRiKxLW1k6Ns74qy-xYHD-Ri74VBwDubupambtigBdCGEwUqqM3aljZTccFTVOVvxCnVuhJCXbDPPXwDAjaqgNCt2X49jXEL_mW1tsj4Oh6zubVzmMGdpyLaUyKU__Db4dLATZe8_safJdiGGtFyzC2_jTJvTrln7-NA2z_nu9enYtcuDgZQbIuesVV5a7xBLxQWqY6H4MKWvOl0JrSWVXoB2neUKBXYIxNGDAwKDa3b7rw1EtB-n8G2nZX96i799sEkV</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Applying Dataflow Analysis to Detecting Software Vulnerability</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Hyunha Kim ; Tae-Hyoung Choi ; Seung-Cheol Jung ; Hyoung-Cheol Kim ; Oukseh Lee ; Kyung-Goo Doh</creator><creatorcontrib>Hyunha Kim ; Tae-Hyoung Choi ; Seung-Cheol Jung ; Hyoung-Cheol Kim ; Oukseh Lee ; Kyung-Goo Doh</creatorcontrib><description>In this paper, we propose a software vulnerability checker which takes rules describing vulnerability patterns and a source program as input and detects locations and paths of the patterns in the program. Simple and flow patterns for vulnerabilities are described as rules in the specification language we designed. The lightweight control and data flow analysis is necessary to detect flow patterns. Newly discovered vulnerability patterns can easily be added to the existing rules. We implement the detector in three parts: a pattern matcher which finds locations of vulnerabilities in source program, a flow graph constructor which extracts the control flow and data flow from the program, and a flow analyzer which finds program's vulnerable execution paths.</description><identifier>ISSN: 1738-9445</identifier><identifier>ISBN: 8955191367</identifier><identifier>ISBN: 9788955191363</identifier><identifier>ISBN: 8955191359</identifier><identifier>ISBN: 9788955191356</identifier><identifier>DOI: 10.1109/ICACT.2008.4493756</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer science ; Data analysis ; Dataflow Analysis ; Detectors ; Engines ; Flow graphs ; Information analysis ; Pattern analysis ; Pattern matching ; Software Vulnerability ; Specification languages ; Static Analysis ; Testing</subject><ispartof>2008 10th International Conference on Advanced Communication Technology, 2008, Vol.1, p.255-258</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4493756$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,778,782,787,788,2054,27912,54907</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4493756$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Hyunha Kim</creatorcontrib><creatorcontrib>Tae-Hyoung Choi</creatorcontrib><creatorcontrib>Seung-Cheol Jung</creatorcontrib><creatorcontrib>Hyoung-Cheol Kim</creatorcontrib><creatorcontrib>Oukseh Lee</creatorcontrib><creatorcontrib>Kyung-Goo Doh</creatorcontrib><title>Applying Dataflow Analysis to Detecting Software Vulnerability</title><title>2008 10th International Conference on Advanced Communication Technology</title><addtitle>ICACT</addtitle><description>In this paper, we propose a software vulnerability checker which takes rules describing vulnerability patterns and a source program as input and detects locations and paths of the patterns in the program. Simple and flow patterns for vulnerabilities are described as rules in the specification language we designed. The lightweight control and data flow analysis is necessary to detect flow patterns. Newly discovered vulnerability patterns can easily be added to the existing rules. We implement the detector in three parts: a pattern matcher which finds locations of vulnerabilities in source program, a flow graph constructor which extracts the control flow and data flow from the program, and a flow analyzer which finds program's vulnerable execution paths.</description><subject>Computer science</subject><subject>Data analysis</subject><subject>Dataflow Analysis</subject><subject>Detectors</subject><subject>Engines</subject><subject>Flow graphs</subject><subject>Information analysis</subject><subject>Pattern analysis</subject><subject>Pattern matching</subject><subject>Software Vulnerability</subject><subject>Specification languages</subject><subject>Static Analysis</subject><subject>Testing</subject><issn>1738-9445</issn><isbn>8955191367</isbn><isbn>9788955191363</isbn><isbn>8955191359</isbn><isbn>9788955191356</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81KxDAURgMqOI7zArrpC7Te9CZpshFKxz8YcGFxO6TxRiKxLW1k6Ns74qy-xYHD-Ri74VBwDubupambtigBdCGEwUqqM3aljZTccFTVOVvxCnVuhJCXbDPPXwDAjaqgNCt2X49jXEL_mW1tsj4Oh6zubVzmMGdpyLaUyKU__Db4dLATZe8_safJdiGGtFyzC2_jTJvTrln7-NA2z_nu9enYtcuDgZQbIuesVV5a7xBLxQWqY6H4MKWvOl0JrSWVXoB2neUKBXYIxNGDAwKDa3b7rw1EtB-n8G2nZX96i799sEkV</recordid><startdate>200802</startdate><enddate>200802</enddate><creator>Hyunha Kim</creator><creator>Tae-Hyoung Choi</creator><creator>Seung-Cheol Jung</creator><creator>Hyoung-Cheol Kim</creator><creator>Oukseh Lee</creator><creator>Kyung-Goo Doh</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200802</creationdate><title>Applying Dataflow Analysis to Detecting Software Vulnerability</title><author>Hyunha Kim ; Tae-Hyoung Choi ; Seung-Cheol Jung ; Hyoung-Cheol Kim ; Oukseh Lee ; Kyung-Goo Doh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-9eeccaa6f5afc332614368954d92f7b874885e2f408cba16343b30e13f0c0e093</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Computer science</topic><topic>Data analysis</topic><topic>Dataflow Analysis</topic><topic>Detectors</topic><topic>Engines</topic><topic>Flow graphs</topic><topic>Information analysis</topic><topic>Pattern analysis</topic><topic>Pattern matching</topic><topic>Software Vulnerability</topic><topic>Specification languages</topic><topic>Static Analysis</topic><topic>Testing</topic><toplevel>online_resources</toplevel><creatorcontrib>Hyunha Kim</creatorcontrib><creatorcontrib>Tae-Hyoung Choi</creatorcontrib><creatorcontrib>Seung-Cheol Jung</creatorcontrib><creatorcontrib>Hyoung-Cheol Kim</creatorcontrib><creatorcontrib>Oukseh Lee</creatorcontrib><creatorcontrib>Kyung-Goo Doh</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Hyunha Kim</au><au>Tae-Hyoung Choi</au><au>Seung-Cheol Jung</au><au>Hyoung-Cheol Kim</au><au>Oukseh Lee</au><au>Kyung-Goo Doh</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Applying Dataflow Analysis to Detecting Software Vulnerability</atitle><btitle>2008 10th International Conference on Advanced Communication Technology</btitle><stitle>ICACT</stitle><date>2008-02</date><risdate>2008</risdate><volume>1</volume><spage>255</spage><epage>258</epage><pages>255-258</pages><issn>1738-9445</issn><isbn>8955191367</isbn><isbn>9788955191363</isbn><isbn>8955191359</isbn><isbn>9788955191356</isbn><abstract>In this paper, we propose a software vulnerability checker which takes rules describing vulnerability patterns and a source program as input and detects locations and paths of the patterns in the program. Simple and flow patterns for vulnerabilities are described as rules in the specification language we designed. The lightweight control and data flow analysis is necessary to detect flow patterns. Newly discovered vulnerability patterns can easily be added to the existing rules. We implement the detector in three parts: a pattern matcher which finds locations of vulnerabilities in source program, a flow graph constructor which extracts the control flow and data flow from the program, and a flow analyzer which finds program's vulnerable execution paths.</abstract><pub>IEEE</pub><doi>10.1109/ICACT.2008.4493756</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1738-9445
ispartof 2008 10th International Conference on Advanced Communication Technology, 2008, Vol.1, p.255-258
issn 1738-9445
language eng
recordid cdi_ieee_primary_4493756
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Computer science
Data analysis
Dataflow Analysis
Detectors
Engines
Flow graphs
Information analysis
Pattern analysis
Pattern matching
Software Vulnerability
Specification languages
Static Analysis
Testing
title Applying Dataflow Analysis to Detecting Software Vulnerability
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T03%3A15%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Applying%20Dataflow%20Analysis%20to%20Detecting%20Software%20Vulnerability&rft.btitle=2008%2010th%20International%20Conference%20on%20Advanced%20Communication%20Technology&rft.au=Hyunha%20Kim&rft.date=2008-02&rft.volume=1&rft.spage=255&rft.epage=258&rft.pages=255-258&rft.issn=1738-9445&rft.isbn=8955191367&rft.isbn_list=9788955191363&rft.isbn_list=8955191359&rft.isbn_list=9788955191356&rft_id=info:doi/10.1109/ICACT.2008.4493756&rft_dat=%3Cieee_6IE%3E4493756%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4493756&rfr_iscdi=true