ARMORY: An automatic security testing tool for buffer overflow defect detection

  • Authors:
  • Li-Han Chen;Fu-Hau Hsu;Yanling Hwang;Mu-Chun Su;Wei-Shinn Ku;Chi-Hsuan Chang

  • Affiliations:
  • Department of Computer Science and Information Engineering, National Central University, Jhongli 320, Taiwan, ROC;Department of Computer Science and Information Engineering, National Central University, Jhongli 320, Taiwan, ROC;School of Applied Foreign Languages, Chung Shan Medical University, Taichung 402, Taiwan, ROC;Department of Computer Science and Information Engineering, National Central University, Jhongli 320, Taiwan, ROC;Department of Computer Science and Software Engineering, Auburn University, Auburn, AL 36849, USA;Chunghwa Telecom Laboratories, Yang-Mei 326, Taiwan, ROC

  • Venue:
  • Computers and Electrical Engineering
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Program Buffer Overflow Defects (PBODs) are the stepping stones of Buffer Overflow Attacks (BOAs), which are one of the most dangerous security threats to the Internet. In this paper, we propose a kernel-based security testing tool, named ARMORY, for software engineers to detect PBODs automatically when they apply all kinds of testing, especially functional testing and unit testing, without increasing the testing workload. Besides, ARMORY does not need any attack instance, any training phase, or source code to finish its security testing. ARMORY can detect unknown PBODs. ARMORY not only can improve software quality, but also can reduce the amount of system resources used to protect a system. We implemented ARMORY in Linux kernel by modifying sys_read() system call and entry. S which deals all system call. Experimental results show that ARMORY can automatically detect PBODs when programmers test the functionality of their programs.