• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)

Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ÀÇ¹Ì ±â¹Ý Á¤Àû ºÐ¼®°ú ±ÔÄ¢ ¸í¼¼ ¾ð¾î¸¦ È°¿ëÇÑ C/C++ ÇÁ·Î±×·¥ º¸¾È Ãë¾àÁ¡ °ËÃâ
¿µ¹®Á¦¸ñ(English Title) Detecting C/C++ Program Security Vulnerability Based on Static Semantic Analysis and Rule Description Language
ÀúÀÚ(Author) À±¿ëÈ£   Áø¹Î½Ä   Á¤¿µ¹ü   À̱ÔÈ£   ±èÈñµ¿   ±èÁø±¹   Yongho Yoon   Minsik Jin   Yungbum Jung   Gyuho Lee   Heedong Kim   Jingoog Kim  
¿ø¹®¼ö·Ïó(Citation) VOL 25 NO. 10 PP. 0493 ~ 0499 (2019. 10)
Çѱ۳»¿ë
(Korean Abstract)
º¸¾È Ãë¾àÁ¡À» Á¤Àû ºÐ¼®À¸·Î °ËÃâÇÏ´Â °Í¿¡´Â ¿©·¯ ÀåÁ¡ÀÌ ÀÖÁö¸¸ ÀϹÝÀûÀ¸·Î »õ·Î¿î Ãë¾àÁ¡ °ËÃâÀ» Áö¿øÇϱâ À§ÇÑ ºñ¿ëÀÌ Å©´Ù´Â ¾î·Á¿òÀÌ ÀÖ´Ù. °ËÃâ ¹üÀ§¸¦ ¼Õ½±°Ô È®ÀåÇϱâ À§ÇØ º¸¾È Ãë¾àÁ¡À» Ç¥ÇöÇÒ ¼ö ÀÖ´Â ¹æ¹ýÀ» Á¤ÀÇÇÏ°í ±× Ç¥Çö¿¡ ºÎÇÕÇÏ´Â ÇÁ·Î±×·¥À» °ËÃâÇÏ´Â ±â¼úÀÌ Á¸ÀçÇÏÁö¸¸ ´ë°³ ÇÁ·Î±×·¥ÀÇ ¸ð¾ç¿¡¸¸ ÀÇÁ¸Çϰųª °£´ÜÇÑ °ª È帧 ºÐ¼®¿¡¸¸ Àû¿ëÇÒ ¼ö ÀÖ¾ú´Ù. ÀÌ·± Á¡À» º¸¿ÏÇϱâ À§ÇÏ¿© º¸¾È ¾àÁ¡À» Ç¥ÇöÇÒ ¼ö ÀÖ´Â ±ÔÄ¢ ¸í¼¼ ¾ð¾î¸¦ Á¤ÀÇÇÏ°í À̸¦ ±â¹ÝÀ¸·Î Ãë¾àÁ¡À» °ËÃâÇÏ´Â ¿ä¾à Çؼ® ±â¹Ý Á¤Àû ºÐ¼® µµ±¸¸¦ °í¾È ¹× ±¸ÇöÇÏ¿´´Ù. ºÐ¼® ´ë»ó ¾ð¾î´Â C/C++À̸ç, »ó¿ë Á¤Àû ºÐ¼® µµ±¸¿¡ Æ÷ÇÔµÈ C/C++ ºÐ¼® ¿£ÁøÀ» ±â¹ÝÀ¸·Î ±ÔÄ¢ ¸í¼¼ ¾ð¾î ¸ÅĪ °Ë»ç±â¸¦ ±¸ÇöÇß´Ù. ´ë»ó Ãë¾àÁ¡Àº CWE(Common Weakness Enumeration) ¸ñ·Ï Áß ÀûÇÕÇÑ 17°¡Áö¸¦ ¼±º°Çß´Ù. Á¤¿ÀŽ·ü °è»êÀ» À§ÇØ ÀÚµ¿»ý¼ºÇÑ Å×½ºÆ® ¼ÂÀ» ´ë»óÀ¸·Î ¼º´ÉÀ» ½ÃÇèÇÑ °á°ú Á¤Å½·üÀº 61.4%, ¿ÀŽ·üÀº 7.5%·Î Áý°èµÇ¾ú´Ù.
¿µ¹®³»¿ë
(English Abstract)
In spite of a number of advantages to detecting security holes using static semantic analysis, new types of vulnerabilities are not easily detected by the existing static analyzers. Some technologies have defined mechanisms to identify security vulnerabilities and match them with the programs but they are based only on simple syntactic analysis or data-flow analysis. We defined rule description language (RDL) to describe vulnerability rules and made a static analyzer based on abstract interpretation that detects the denoted defects in C/C programs. Implementation of the RDL matching engine was based on an existing commercial C/C static analysis tool. We selected 17 rules from the CWE (Common Weakness Enumeration) list that fit with RDL and static analysis. We evaluated the correctness of our tool with automatically generated test cases and the result showed 61.4% true positive and 7.5% false negative rates.
Å°¿öµå(Keyword) º¸¾È Ãë¾àÁ¡   ±ÔÄ¢ ¸í¼¼ ¾ð¾î   Á¤Àû ºÐ¼®   ¿ä¾à Çؼ®   security   vulnerability   rule description language   static analysis   semantic analysis  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå