Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

CLORIFI: software vulnerability discovery using code clone verification

Authors
Li, HongzheKwon, HyuckminKwon, JonghoonLee, Heejo
Issue Date
25-Apr-2016
Publisher
WILEY
Keywords
software vulnerability; code clone; concolic testing; vulnerability verification
Citation
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, v.28, no.6, pp.1900 - 1917
Indexed
SCIE
SCOPUS
Journal Title
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
Volume
28
Number
6
Start Page
1900
End Page
1917
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/88899
DOI
10.1002/cpe.3532
ISSN
1532-0626
Abstract
Software vulnerability has long been considered an important threat to the system safety. A vulnerability is often reproduced because of the frequent code reuse by programmers. Security patches are usually not propagated to all code clones; however, they could be leveraged to discover unknown vulnerabilities. Static code auditing approaches are frequently proposed to scan source codes for security flaws; unfortunately, these approaches generate too many false positives. While dynamic execution analysis methods can precisely report vulnerabilities, they are ineffective in path exploration, which limits them to scale to large programs. With the purpose of detecting vulnerability in a scalable way with more preciseness, in this paper, we propose a novel mechanism, called software vulnerability discovery using Code Clone Verification (CLORIFI), that scalably discovers vulnerabilities in real world programs using code clone verification. In the beginning, we use a fast and scalable syntax-based way to find code clones in program source codes based on released security patches. Subsequently, code clones are being verified using concolic testing to dramatically decrease the false positives. In addition, we mitigate the path explosion problem by backward sensitive data tracing in concolic execution. Experiments have been conducted with real-world open-source projects (recent Linux OS distributions and program packages). As a result, we found 7 real vulnerabilities out of 63 code clones from Ubuntu 14.04 LTS (Canonical, London, UK) and 10 vulnerabilities out of 40 code clones from CentOS 7.0 (The CentOS Project(community contributed)). Furthermore, we confirmed more code clone vulnerabilities in various versions of programs including Rsyslog (Open Source(Original author: Rainer Gerhards)), Apache (Apache Software Foundation, Forest Hill, Maryland, USA) and Firefox (Mozilla Corporation, Mountain View, California, USA). In order to evaluate the effectiveness of vulnerability verification in a systematic way, we also utilized Juliet Test Suite as measurement objects. The results show that CLORIFI achieves 98% accuracy with 0 false positives. Copyright (C) 2015 John Wiley & Sons, Ltd.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Hee jo photo

Lee, Hee jo
Department of Computer Science and Engineering
Read more

Altmetrics

Total Views & Downloads

BROWSE