|
This article is cited in 1 scientific paper (total in 1 paper)
Dynamic detection of use after free bugs
S. A. Asryana, S. S. Gaysaryanbcde, Sh. F. Kurmangaleevd, A. M. Aghabalyanf, N. H. Hovsepyanf, S. S. Sargsyanf a Institute for Informatics and Automation Problems of NAS RA
b Lomonosov Moscow State University
c Moscow Institute of Physics and Technology (State University)
d Ivannikov Institute for System Programming of the Russian Academy of Sciences
e National Research University Higher School of Economics (HSE)
f Yerevan State University
Abstract:
The article describes new method of use after free bug detection using program dynamic analysis. In memory-unsafe programming languages such as C/C++ this class of bugs mainly accurse when program tries to access specific area of dynamically allocated memory that has been already freed. This method is based on combination of two basic components. The first component tracks all memory operations through dynamic binary instrumentation and searches for inappropriate memory access. It preserves two sets of memory address for all allocation and free instructions. Using both sets this component checks whether current memory is accessible through its address or it has been already freed. It is based on dynamic symbolic execution and code coverage algorithm. It is used to maximize the number of execution paths of the program. Using initial input, it starts symbolic execution of the target program and gathers input constraints from conditional statements. The new inputs are generated by systematically solving saved constraints using constraint solver and then sorted by number of basic blocks they cover. Proposed method detects use after free bugs by applying first component each time when second one was able to open new path of the program. It was tested on our synthetic tests that were created based on well-known use after free bug patterns. The method was also tested on couple of real projects by injecting bugs on different levels of execution.
Keywords:
program dynamic analysis, use after free bug, dynamic symbolic execution, code coverage, instrumentation.
Citation:
S. A. Asryan, S. S. Gaysaryan, Sh. F. Kurmangaleev, A. M. Aghabalyan, N. H. Hovsepyan, S. S. Sargsyan, “Dynamic detection of use after free bugs”, Proceedings of ISP RAS, 30:3 (2018), 7–20
Linking options:
https://www.mathnet.ru/eng/tisp321 https://www.mathnet.ru/eng/tisp/v30/i3/p7
|
Statistics & downloads: |
Abstract page: | 222 | Full-text PDF : | 58 | References: | 19 |
|