Memory-related Vulnerabilities Localization Technology Based on Dynamic Tainting

房陈,茅兵,谢立
DOI: https://doi.org/10.3969/j.issn.1000-3428.2010.07.047
2010-01-01
Abstract:This paper proposes an efficient mechanism to detect and locate the program vulnerability based on the binary taint analysis and program analysis techniques.The method adopts the data flow analysis and taint analysis.The taint analysis method records the instruction which propagates the taint flag as well as the memory address it writes to.When it detects the attack,it locates the bug by searching the malicious write instruction through the memory address it records.Results of experiments show that the system can localize popular vulnerabilities successfully,and it is able to localize library function call point.
What problem does this paper attempt to address?