Authors:
Salim Yahia Kissi
1
;
Yassamine Seladji
1
and
Rabéa Ameur-Boulifa
2
Affiliations:
1
LRIT, University of Abou Bekr Belkaid, Tlemcen, Algeria
;
2
LTCI, Télécom Paris, Institut Polytechnique de Paris, France
Keyword(s):
Security Vulnerability, Memory Errors, Software Analysis, Satisfiability Analysis, Integer Overflow.
Abstract:
Sometimes computing platforms, e.g. storage device, compilers, operating systems used to execute software programs make them misbehave, this type of issues could be exploited by attackers to access sensitive data and compromise the system. This paper presents an automatable approach for detecting such security vulnerabilities due to improper execution environment. Specifically, the advocated approach targets the detection of security vulnerabilities in the software caused by memory overflows such as integer overflow. Based on analysis of the source code and by using a knowledge base gathering common execution platform issues and known restrictions, the paper proposes a framework able to infer the required assertions, without manual code annotations and rewriting, for generating logical formulas that can be used to reveal potential code weaknesses.