90 likes | 211 Views
This presentation by José Troche examines the effectiveness of static analysis tools in identifying exploitable buffer overflows in widely used open source software, including BIND, WU-FTPD, and Sendmail. It discusses the motivation behind using static analysis over dynamic approaches, the challenges faced during evaluations, and the initial findings from testing various tools. While some tools detected errors, high false positive rates and limited capabilities highlight the need for further improvements to ensure reliable vulnerability detection.
E N D
Testing Static Analysis Tools using Exploitable Buffer Overflows from Open Source CodeZitser, Lippmann & Leek Presented by: José Troche
Motivation • Real attacks in server software • Malicious code and DoS • Why Static Analysis tools? • Dynamic approach is expensive & incomplete • Safe languages make runtime checks • Perform an unbiased evaluation
Test Cases • BIND (4) • Most popular DNS server • WU-FTPD (3) • Popular FTP daemon • Sendmail (7) • Dominant mail transfer agent Total vulnerabilities: 14
Initial experience (145K lines) • Splint issued parse errors • ARCHER quit with a Div/0 error • PolySpace run 4 days and quit
New Testing Approach • Create lower scale models • BAD vs. OK version • Retrospective analysis
Discussion • Detection Rate: 3 of 5 < 5% • High rate of false alarms (1 in 12 & 46) • Results only on marked lines • Insensitive to corrections (<40%) • None was able to analyze sendmail
Conclusion • Results are promising: • Errors were detected • Need of improvement because of: • False positives • Poor discrimination