Journal of Software Engineering and Applications

Volume 3, Issue 10 (October 2010)

ISSN Print: 1945-3116   ISSN Online: 1945-3124

Google-based Impact Factor: 2  Citations  

Program Slicing Based Buffer Overflow Detection

HTML  Download Download as PDF (Size: 449KB)  PP. 965-971  
DOI: 10.4236/jsea.2010.310113    5,136 Downloads   8,851 Views  Citations

Affiliation(s)

.

ABSTRACT

The development of the information technology has brought threats to human society when it has influenced seriously the global politics, economics and military etc. But among the security of information system, buffer overrun vulnerability is undoubtedly one of the most important and common vulnerabilities. This paper describes a new technology, named program slicing, to detect the buffer overflow leak in security-critical C code. First, we use slicing technology to analyze the variables which may be with vulnerability and extract the expressions which will bring memory overflow. Secondly, we utilize debug technology to get the size of memory applied by the variable and the size of memory used for these code segments (the slicing result) further. Therefore we can judge whether it will overflow according to the analysis above. According to the unique excellence of program slicing performing in the large-scale program’s debugging, the method to detect buffer overrun vulnerability described in this paper will reduce the workload greatly and locate the code sentences affected by corresponding variable set quickly, particularly including the potential vulnerability caused by parameter dependence among the subroutines.

Share and Cite:

Zhang, Y. , Fu, W. , Qian, X. and Chen, W. (2010) Program Slicing Based Buffer Overflow Detection. Journal of Software Engineering and Applications, 3, 965-971. doi: 10.4236/jsea.2010.310113.

Copyright © 2025 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.