[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2048147.2048158acmconferencesArticle/Chapter ViewAbstractPublication PagessplashConference Proceedingsconference-collections
demonstration

An 'explicit type enforcement' program transformation tool for preventing integer vulnerabiliites

Published: 22 October 2011 Publication History

Abstract

A security-oriented program transformation is similar to a refactoring, but it is not intended to preserve behavior. Instead, it improves the security of systems, which means it preserves the expected behavior, but changes a system's response to security attacks. This demo is about a tool for Explicit Type Enforcement transformation, which adds proper typecast to integer variables. The tool is built using Eclipse CDT and applies on C programs. Preliminary results show that it is very effective in fixing integer-related vulnerabilities. Power tools such as these can improve developer productivity and produce vulnerability-free software.

References

[1]
K. Ashcraft and D. Engler. Using programmer-written compiler extensions to catch security holes. In SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy, page 143, Washington, DC, USA, 2002. IEEE Computer Society.
[2]
blexim. Basic integer overflows. Phrack, 60, 2002.
[3]
E. N. Ceesay, J. Zhou, M. Gertz, K. N. Levitt, and M. Bishop. Using type qualifiers to analyze untrusted integers and detecting security flaws in C programs. In R. Büschkes and P. Laskov, editors, DIMVA, volume 4064 of Lecture Notes in Computer Science, pages 1--16. Springer, 2006.
[4]
X. C. L. David Molnar and D. A. Wagner. Dynamic test generation to find integer bugs in x86 binary Linux programs. In Proceedings of the 18th USENIX Security Symposium. USENIX, Aug. 2009.
[5]
M. Hafiz. Security On Demand. PhD thesis, University of Illinois Urbana-Champaign, 2010.
[6]
M. Hafiz, P. Adamczyk, and R. Johnson. Systematically eradicating data injection attacks using security-oriented program transformations. In Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS-09), Feb 2009.
[7]
T. Wang, T. Wei, Z. Lin, and W. Zou. Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution. In NDSS, 2009.
[8]
R. Wojtczuk. UQBTng: A tool capable of automatically finding integer overflows in Win32 binaries. In 22nd Chaos Communication Congress, 2005.

Cited By

View all
  • (2012)OpenRefactory/CProceedings of the 3rd annual conference on Systems, programming, and applications: software for humanity10.1145/2384716.2384730(27-28)Online publication date: 19-Oct-2012

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
OOPSLA '11: Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion
October 2011
360 pages
ISBN:9781450309424
DOI:10.1145/2048147

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 October 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. integer overflow
  2. program transformation

Qualifiers

  • Demonstration

Conference

SPLASH '11
Sponsor:

Upcoming Conference

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2012)OpenRefactory/CProceedings of the 3rd annual conference on Systems, programming, and applications: software for humanity10.1145/2384716.2384730(27-28)Online publication date: 19-Oct-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media