An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit
Vol. 15, No. 1, pp. 45-52,
Feb. 2008
10.3745/KIPSTA.2008.15.1.45
PDF
Abstract
In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.
Statistics
Cite this article
[IEEE Style]
S. Y. Joo, J. S. Ahn, J. W. Jo, "An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit," The KIPS Transactions:PartA, vol. 15, no. 1, pp. 45-52, 2008. DOI: 10.3745/KIPSTA.2008.15.1.45.
[ACM Style]
Seong Yong Joo, Joon Seon Ahn, and Jang Wu Jo. 2008. An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit. The KIPS Transactions:PartA, 15, 1, (2008), 45-52. DOI: 10.3745/KIPSTA.2008.15.1.45.