바이너리에서 Invalid Memory Access 취약점 탐지 기술 동향 연구
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 오희국 | - |
dc.date.accessioned | 2025-04-01T06:01:23Z | - |
dc.date.available | 2025-04-01T06:01:23Z | - |
dc.date.issued | 2021-06 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/122421 | - |
dc.description.abstract | According to the vulnerability risk rankings calculated by the CWE website, most of the top vulnerabilities are invalid memory access vulnerabilities such as out-of-bounds write, use-after-free, null-pointer-dereference, etc. This is because the characteristic of the memory-related vulnerability, which lacks sanitization in a data flow, satisfied the requirements of the attackers to exploit. Most of the vulnerability detection research is based on source code. However, due to many manufacturers or vendors only providing products but not source code, techniques that can detect vulnerabilities in the binary is necessary in such situations. While due to the lack of many types as in high-level languages, such as pointers, vulnerability detection in binary systems poses many challenges. In this article, we discuss such challenges for invalid memory access vulnerability detection in binary | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.title | 바이너리에서 Invalid Memory Access 취약점 탐지 기술 동향 연구 | - |
dc.type | Conference | - |
dc.citation.title | 한국정보보호학회 하계학술대회 | - |
dc.citation.volume | 31 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 576 | - |
dc.citation.endPage | 579 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.