Automatic detection of printf format string vulnerabilities in software applications using static analysis

  • Authors:
  • Radha Vedala;Simhadri Anil kumar

  • Affiliations:
  • IDRBT University Of Hyderabad, Hyderabad;IDRBT University Of Hyderabad, Hyderabad

  • Venue:
  • Proceedings of the CUBE International Information Technology Conference
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

1. Much of the blame for security violations goes to bad software and that too at the coding level. Even the best security algorithms can be broken due to incorrect programs. The firstpublished reports of format string bugs appeared in 2000, followed by the rapid discovery of similar vulnerabilities in most high-profile software projects. These includethe Apache web server, wu-ftpd FTP server, OpenBSD kerneland many others. There is a need to find the vulnerabilities like variable buffer overflow, stack traces, control flows, string format syntaxes etc in software before it is deployed. If one can give the facility to verify the presence of these vulnerabilities at the time the program is written, that helps the developer in correcting it then and there. We have developed "checkers" using codan which is a light-weight static analysis framework in CDT(Eclipse's C/C++ Development Tooling project). Our checkers perform real time analysis using Abstract Syntax Tree on the code to find some of the format string vulnerabilities in C language. The method is explained in the paper.