slide1 n.
Skip this Video
Loading SlideShow in 5 Seconds..
Presented by: José Troche PowerPoint Presentation
Download Presentation
Presented by: José Troche

play fullscreen
1 / 9
Download Presentation

Presented by: José Troche - PowerPoint PPT Presentation

elisha
92 Views
Download Presentation

Presented by: José Troche

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Testing Static Analysis Tools using Exploitable Buffer Overflows from Open Source CodeZitser, Lippmann & Leek Presented by: José Troche

  2. Motivation • Real attacks in server software • Malicious code and DoS • Why Static Analysis tools? • Dynamic approach is expensive & incomplete • Safe languages make runtime checks • Perform an unbiased evaluation

  3. Tools Evaluated

  4. Test Cases • BIND (4) • Most popular DNS server • WU-FTPD (3) • Popular FTP daemon • Sendmail (7) • Dominant mail transfer agent Total vulnerabilities: 14

  5. Initial experience (145K lines) • Splint issued parse errors • ARCHER quit with a Div/0 error • PolySpace run 4 days and quit

  6. New Testing Approach • Create lower scale models • BAD vs. OK version • Retrospective analysis

  7. Results

  8. Discussion • Detection Rate: 3 of 5 < 5% • High rate of false alarms (1 in 12 & 46) • Results only on marked lines • Insensitive to corrections (<40%) • None was able to analyze sendmail

  9. Conclusion • Results are promising: • Errors were detected • Need of improvement because of: • False positives • Poor discrimination