Static Analysis and Implementation of TOCTOU Vulnerability
碩士 === 國立中央大學 === 資訊工程學系 === 107 === C language has many advantages of high-level language and low-level language, such as high execution efficiency, direct control of hardware, and good portability, hence it is widely used in the industry. According to the popular programming language list of TIOBE...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2019
|
Online Access: | http://ndltd.ncl.edu.tw/handle/7ydy2z |
id |
ndltd-TW-107NCU05392033 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-107NCU053920332019-10-22T05:28:09Z http://ndltd.ncl.edu.tw/handle/7ydy2z Static Analysis and Implementation of TOCTOU Vulnerability TOCTOU 漏洞的靜態分析與實作 Yao-Nang Tseng 曾耀儂 碩士 國立中央大學 資訊工程學系 107 C language has many advantages of high-level language and low-level language, such as high execution efficiency, direct control of hardware, and good portability, hence it is widely used in the industry. According to the popular programming language list of TIOBE INDEX website, C language has maintained its position in the top 2 since 1989. However, C language has many inborn problems, which is likely to cause programmers to write unsafe codes. In addition, it has accumulated a large number of legacy codes due to its long history. Therefore, most programmers rely on dynamic analysis or static analysis tools to identify these vulnerabilities. TOCTOU (time of check to time of use), one of those vulnerabilities, will lead to serious system security problems once abused. Although scholars have proposed some detection methods, the results are not ideal. We propose a detection method which combines symbolic execution and parameter tracking. The proposed method is able to detect TOCTOU more accurately, and deal with alias problems of variables and functions. Moreover, we implement this method with Clang Static Analyzer and present the detection result through command line and web pages. Finally, the tool we implemented is tested by Juliet Test Suite to verify its accuracy, and compared with the methods proposed in the literature and the C static tools commonly used in the industry. Yung-Yu Zhuang 莊永裕 2019 學位論文 ; thesis 58 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中央大學 === 資訊工程學系 === 107 === C language has many advantages of high-level language and low-level language, such as high execution efficiency, direct control of hardware, and good portability, hence it is widely used in the industry. According to the popular programming language list of TIOBE INDEX website, C language has maintained its position in the top 2 since 1989.
However, C language has many inborn problems, which is likely to cause programmers to write unsafe codes. In addition, it has accumulated a large number of legacy codes due to its long history. Therefore, most programmers rely on dynamic analysis or static analysis tools to identify these vulnerabilities. TOCTOU (time of check to time of use), one of those vulnerabilities, will lead to serious system security problems once abused. Although scholars have proposed some detection methods, the results are not ideal.
We propose a detection method which combines symbolic execution and parameter tracking. The proposed method is able to detect TOCTOU more accurately, and deal with alias problems of variables and functions. Moreover, we implement this method with Clang Static Analyzer and present the detection result through command line and web pages. Finally, the tool we implemented is tested by Juliet Test Suite to verify its accuracy, and compared with the methods proposed in the literature and the C static tools commonly used in the industry.
|
author2 |
Yung-Yu Zhuang |
author_facet |
Yung-Yu Zhuang Yao-Nang Tseng 曾耀儂 |
author |
Yao-Nang Tseng 曾耀儂 |
spellingShingle |
Yao-Nang Tseng 曾耀儂 Static Analysis and Implementation of TOCTOU Vulnerability |
author_sort |
Yao-Nang Tseng |
title |
Static Analysis and Implementation of TOCTOU Vulnerability |
title_short |
Static Analysis and Implementation of TOCTOU Vulnerability |
title_full |
Static Analysis and Implementation of TOCTOU Vulnerability |
title_fullStr |
Static Analysis and Implementation of TOCTOU Vulnerability |
title_full_unstemmed |
Static Analysis and Implementation of TOCTOU Vulnerability |
title_sort |
static analysis and implementation of toctou vulnerability |
publishDate |
2019 |
url |
http://ndltd.ncl.edu.tw/handle/7ydy2z |
work_keys_str_mv |
AT yaonangtseng staticanalysisandimplementationoftoctouvulnerability AT céngyàonóng staticanalysisandimplementationoftoctouvulnerability AT yaonangtseng toctoulòudòngdejìngtàifēnxīyǔshízuò AT céngyàonóng toctoulòudòngdejìngtàifēnxīyǔshízuò |
_version_ |
1719273868351242240 |