An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit


The KIPS Transactions:PartA, Vol. 15, No. 1, pp. 45-52, Feb. 2008
10.3745/KIPSTA.2008.15.1.45,   PDF Download:

Abstract

In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. Y. Joo, J. S. Ahn, J. W. Jo, "An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit," The KIPS Transactions:PartA, vol. 15, no. 1, pp. 45-52, 2008. DOI: 10.3745/KIPSTA.2008.15.1.45.

[ACM Style]
Seong Yong Joo, Joon Seon Ahn, and Jang Wu Jo. 2008. An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit. The KIPS Transactions:PartA, 15, 1, (2008), 45-52. DOI: 10.3745/KIPSTA.2008.15.1.45.