Journal of South China University of Technology (Natural Science Edition) ›› 2018, Vol. 46 ›› Issue (8): 81-87.doi: 10.3969/j.issn.1000-565X.2018.08.012

• Computer Science & Technology • Previous Articles     Next Articles

Detection of Unlink Attack Based on Symbolic Execution

 HUANG Ning1 HUANG Shuguang1 LIANG Zhichao2    

  1. 1. Electronic Engineering Institute,National University of Defense Technology,Hefei 230037,Anhui,China;
    2. School of Automation Science and Engineering,South China University of Technology,Guangzhou 510640,Guangdong,China
  • Received:2017-12-20 Revised:2018-02-11 Online:2018-08-25 Published:2018-07-01
  • Contact: Ning HUANG,黄宁(1990-),男,博士生,主要从事软件漏洞分析研究 E-mail:809848161@qq.com
  • About author: 黄宁(1990-),男,博士生,主要从事软件漏洞分析研究
  • Supported by:
     Supported by the National Key Research and Development Program“Cyberspace Security” (2017YFB0802905) 

Abstract: Unlink attack is a kind of attack against heap-based overflow vulnerability in Linux. Existed detection technology of the buffer overflow attack find the vulnerability trigger point and generate testcase by checking the control flow state. However, the heap-based overflow data seldom lead to the control flow hijack and the protection mechanisms limit the trigger condition, it is hard to judge the program whether or not the conditions of unlink attack is satisfied through existed detection technology. To improve the security of software, and detect the unlink attack, this paper summarized the features of unlink attack according to analyzing the instances, built the detection model of unlink attack, and proposed the unlink detection method based on the model. This method monitored the input data and sensitive cooperation of program by using taint analysis; built the path constraint of tainted data and data constraint which is satisfied the condition of unlink attack by selective symbolic execution; through solving the constraints above, judged if the program can be attacked by unlink and generated testcase. The experiments showed that this method can detect the unlink attack effectively.

Key words: heap-based overflow, buffer overflow, unlink attack, symbol execution, taint analysis

CLC Number: