Skip to main content

A Return-Value-Unchecked Vulnerability Detection Method Based on Property Graph

  • Conference paper
  • First Online:
Recent Developments in Intelligent Systems and Interactive Applications (IISA 2016)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 541))

Abstract

Traditional static analysis methods for binary software vulnerability detection are used only to make use of a single aspect of the target software, so it is difficult to obtain the hidden global properties and relationships which leads to low detection accuracy and high rate of false positives. To improve the effectiveness of the binary software static vulnerability detection, this paper proposes a fusion method for binary software vulnerability detection which first represents the binary software as a single property graph and then the vulnerability is modeled and detected based on this property graph. Because property graph includes integrated information such as the relations between function calls, control flow, data flow relationship and so on, researchers can model vulnerability more easily and accurately. It can detect unknown vulnerabilities accurately and effi-ciently. The experiments of prototype system show that this method can effectively detect Return-Value-Unchecked Vulnerability in binary software.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Delaitre, A., Stivalet, B., Fong, E., et al.: Evaluating bug finders–test and measurement of static code analyzers. In: ACM 1st International Workshop on Complex Faults and Failures in Large Software Systems, pp. 14–20. IEEE (2015)

    Google Scholar 

  2. Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Saxena, P.: BitBlaze: A new approach to computer security via binary analysis. In: Sekar, R., Pujari, Arun, K. (eds.) ICISS 2008. LNCS, vol. 5352, pp. 1–25. Springer, Heidelberg (2008). doi:10.1007/978-3-540-89862-7_1

    Chapter  Google Scholar 

  3. Brumley, D., Jager, I., Avgerinos, T., Schwartz, Edward, J.: BAP: A binary analysis platform. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 463–469. Springer, Heidelberg (2011). doi:10.1007/978-3-642-22110-1_37

    Chapter  Google Scholar 

  4. Nethercote, N., Seward, J.: Valgrind: a framework for heavyweight dynamic binary instrumentation. ACM SIGPLAN Not. 42(6), 89–100 (2007)

    Article  Google Scholar 

  5. Dullien, T., Porst, S.: REIL: A platform-independent intermediate representation of disassembled code for static code analysis. In: Proceeding of CanSecWest (2009)

    Google Scholar 

  6. Rice, H.G.: Classes of recursively enumerable sets and their decision problems. Trans. Am. Math. Soc. 74(2), 358–366 (1953)

    Article  MathSciNet  MATH  Google Scholar 

  7. CVE. http://cve.mitre.org/

  8. NVD. http://nvd.nist.gov/

  9. Zhang, B., Wu, B., Feng, C., et al.: Statically detect invalid pointer dereference vulnerabilities in binary software. In: 2015 IEEE International Conference on Progress in Informatics and Computing (PIC), pp. 390–394. IEEE (2015)

    Google Scholar 

  10. IDA pro. https://www.hex-rays.com

  11. Quynh, N.A.: Capstone: Next-gen disassembly framework. Black Hat USA (2014)

    Google Scholar 

  12. Tesoriero, C.: Getting Started with OrientDB. Packt Publishing Ltd., Birmingham (2013)

    Google Scholar 

  13. Yamaguchi, F.: Pattern-Based Vulnerability Discovery. Ph.D. thesis, Georg-August-University Göttingen (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wu Bo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Kun, H., Bo, W., Dan, X. (2017). A Return-Value-Unchecked Vulnerability Detection Method Based on Property Graph. In: Xhafa, F., Patnaik, S., Yu, Z. (eds) Recent Developments in Intelligent Systems and Interactive Applications. IISA 2016. Advances in Intelligent Systems and Computing, vol 541. Springer, Cham. https://doi.org/10.1007/978-3-319-49568-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49568-2_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49567-5

  • Online ISBN: 978-3-319-49568-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics