Automatically Generating Patch In Binary Programs Using Attribute-Based Taint Analysis

ICICS'10 Proceedings of the 12th international conference on Information and communications security(2010)

引用 6|浏览0
暂无评分
摘要
Vulnerabilities in software threaten safety of hosts. Generating patches could overcome this problem. Patches are usually generated with human intervention, which is very time-consuming and needs a lot of experience. A few heuristic methods can generate patches automatically. But they usually have high false negative and/or false positive rate. We proposed a novel solution and implemented a real system called Patch-Gen that can automatically generate patches for vulnerabilities. Patch-Gen innovatively combines several techniques: (1) It can automatically generate patches for Windows x86 binaries without any need for source code, debugging information or human intervention. (2) Attribute-based taint analysis method (ATAM) is proposed to find attack point and overflow point with no need to record or analyze program execution traces, which saves both analysis time and memory. (3) Patch Gen automatically tunes the candidate position to find the most suitable position to patch. We made several experiments on Patch Gen. The results show that Patch-Gen can successfully generate patches for buffer overflow vulnerabilities in several minutes. The running overhead of the patched applications is less than 1% in average.
更多
查看译文
关键词
Patch generation,Dynamic analysis,Vulnerability,Binary program,Attribute-based taint analysis
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要