Intpatch: Automatically Fix Integer-Overflow-To-Buffer-Overflow Vulnerability At Compile-Time

Chao Zhang,Tielei Wang,Tao Wei,Yu Chen,Wei Zou
DOI: https://doi.org/10.1007/978-3-642-15497-3_5
2010-01-01
Abstract:The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability is an underestimated threat. Automatically identifying and fixing this kind of vulnerability are critical for software security. In tins paper, we present the design and implementation of IntPatch, a. compiler extension for automatically fixing IO2BO vulnerabilities in C/C++ programs at compile time. IntPatch utilizes classic type theory and datafiow analysis framework to identify potential IO2BO vulnerabilities, and then instruments programs with runtime checks. Moreover, IntPatch provides an interface for programmers to facilitate checking integer overflows. We evaluate IntPatch on a number of real-world applications. It has caught all 46 previously known IO2BO vulnerabilities in our test suite and found 21 new bugs. Applications patched by IntPatch have a negligible runtime performance loss which is averaging about 1%.
What problem does this paper attempt to address?