Dissertation/ Thesis

Exploiting Atypical Symbolic Executions

التفاصيل البيبلوغرافية
العنوان: Exploiting Atypical Symbolic Executions
Alternate Title: 操作利用非典型之擬真執行
المؤلفون: Chiu, Shih-Hsin, 邱世欣
Thesis Advisors: Huang, Shih-Kun, 黃世昆
سنة النشر: 2011
المجموعة: National Digital Library of Theses and Dissertations in Taiwan
الوصف: 99
Software security is getting more important recently. There are more and more attacks than before. It is partially due to some design flaws of the programming language and the lack of secure programming practices by programmers. The most serious vulnerability this thesis concerns with is buffer overflow, present in many C/C++ programs, such as the Blaster worm. For preventing from such vulnerabilities, we use symbolic execution with a new memory model supported by KLEE to detect buffer overflow vulnerabilities. This thesis actually generates an exploitable input to trigger buffer overflow and verify the presence of the vulnerability. The input suites we generate are realistic attacks. Unlike the usual hacking methods with manual techniques to reason on the tainting paths, we propose methods to generate exploitable input automatically.
Original Identifier: 099NCTU5394084
نوع الوثيقة: 學位論文 ; thesis
وصف الملف: 46
الاتاحة: http://ndltd.ncl.edu.tw/handle/99873395134955318388
رقم الانضمام: edsndl.TW.099NCTU5394084
قاعدة البيانات: Networked Digital Library of Theses & Dissertations