skip to main content
10.1145/1506216.1506248acmconferencesArticle/Chapter ViewAbstractPublication PagesisecConference Proceedingsconference-collections
research-article

Hybrid analysis of executables to detect security vulnerabilities: security vulnerabilities

Published: 23 February 2009 Publication History

Abstract

Detection of vulnerabilities in executables is one of the major challenges facing the software industry and is mainly due to the unavailability of the source code. In this work, we present a hybrid approach which is a combination of static and dynamic analysis to identify vulnerabilities. In this approach, we first instrument the executable using PIN to extract the control flow and the corresponding assembly code using disassembler. We then perform static analysis on the assembly code for constraint bound checking using control flow and register bounds. In this way, we exploit the synergy between static and dynamic analysis to detect memory leaks, buffer overflow and dangling pointers.

References

[1]
J. Bergeron, M. Debbabi, M. M. Erhioui, and B. Ktari. Static analysis of binary code to isolate malicious behaviors. In Proceedings of the 8th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises, pages 184--189, 1999.
[2]
M. D. Ernst. Static and dynamic analysis: synergy and duality. In In WODA 2003: ICSE Workshop on Dynamic Analysis, pages 24--27, 2003.
[3]
C. Keung Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. Janapa, and R. K. Hazelwood. PIN: Building customized program analysis tools with dynamic instrumentation. In Proceedings of PLDI, pages 190--200. ACM Press, 2005.

Cited By

View all
  • (2020)Malware Detection Techniques: A Survey2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)10.1109/PDGC50313.2020.9315764(25-30)Online publication date: 6-Nov-2020
  • (2020)Using Multi-core Architectures to Improve the Performance of Real-time Dynamic Binary Instrumentation2020 IEEE 23rd International Symposium on Real-Time Distributed Computing (ISORC)10.1109/ISORC49007.2020.00038(167-175)Online publication date: May-2020
  • (2018)A systematic mapping study on the combination of static and dynamic quality assurance techniquesInformation and Software Technology10.1016/j.infsof.2011.06.00354:1(1-15)Online publication date: 29-Dec-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ISEC '09: Proceedings of the 2nd India software engineering conference
February 2009
154 pages
ISBN:9781605584263
DOI:10.1145/1506216
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 February 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. hybrid analysis
  2. instrumentation
  3. memory errors
  4. security vulnerabilities
  5. slicing

Qualifiers

  • Research-article

Conference

ISEC '09
Sponsor:
ISEC '09: India Software Engineering Conference
February 23 - 26, 2009
Pune, India

Acceptance Rates

Overall Acceptance Rate 76 of 315 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Malware Detection Techniques: A Survey2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)10.1109/PDGC50313.2020.9315764(25-30)Online publication date: 6-Nov-2020
  • (2020)Using Multi-core Architectures to Improve the Performance of Real-time Dynamic Binary Instrumentation2020 IEEE 23rd International Symposium on Real-Time Distributed Computing (ISORC)10.1109/ISORC49007.2020.00038(167-175)Online publication date: May-2020
  • (2018)A systematic mapping study on the combination of static and dynamic quality assurance techniquesInformation and Software Technology10.1016/j.infsof.2011.06.00354:1(1-15)Online publication date: 29-Dec-2018
  • (2016)Evolution of evasive malwares: A survey2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT)10.1109/ICCTICT.2016.7514657(641-646)Online publication date: Mar-2016
  • (2016)A smart fuzzing method for detecting heap‐based vulnerabilities in executable codesSecurity and Communication Networks10.1002/sec.16819:18(5098-5115)Online publication date: 16-Nov-2016
  • (2012)Mitigating program security vulnerabilitiesACM Computing Surveys (CSUR)10.1145/2187671.218767344:3(1-46)Online publication date: 14-Jun-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media