Abstract

Aiming at the problem of strong pertinence and poor universality of existing binary vulnerability detection methods, binary vulnerability automatic mining method based on control flow integrity detection is proposed. In view of the common binary vulnerabilities, such as stack overflow, heap overflow, function pointer tampering, structured exception handling attacks and so on, they can be unified and abstracted to destroy the integrity of control flow. This method first obtains all legitimate control flow transfers through static binary analysis, then uses symbol execution engine to explore all feasible paths, and injects constraints at control flow transfers. Finally, by solving constraints to determine whether there is a vulnerability that destroys the integrity of control flow. If there is, it automatically generates input that can trigger vulnerabilities.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call