Planned maintenance
A system upgrade is planned for 13/12-2023, at 12:00-13:00. During this time DiVA will be unavailable.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Amplifying heap overflow vulnerability detection with reinforcement learning
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
2023 (English)Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

The extensive development of cyberspace and the increasing potential for cybersecu-rity vulnerabilities demand the constant production of improved methods for detect-ing and mitigating vulnerabilities in software. In a perfect world, there would be atool that detects and mitigates all types of vulnerabilities in all types of software, butunfortunately, that is not the reality. Most methods need to be specific to have goodperformance. The tool we use in our paper specializes in detecting vulnerabilities inexecutable programs, specifically heap buffer overflow vulnerabilities.In this master thesis, we focus on the problem of detecting heap buffer overflowvulnerabilities in executable programs. We conducted two experiments to answertwo research questions related to this problem. The first research question aims toevaluate the performance of a unit-based symbolic execution method for detectingsuch vulnerabilities in terms of accuracy and execution time. The second researchquestion investigates whether the performance of the method from the first questioncan be improved through the use of the machine learning method Q-learning.In the first experiment, we used the 90 included test programs to evaluate theoriginal version of the tool. For our second experiment, we used 100 other testprograms that we selected from the NIST database, together with the original versionof the tool and our modified version with integrated Q-learning functionality. Thefindings from our experiments show that unit-based symbolic execution tools arecomplex, and the accuracy of these tools can be improved through the use of machinelearning algorithms. However, the use of these algorithms comes at the cost ofexecution time.Overall, this thesis contributes to the field of software security by providing in-sights into the performance and potential improvements of symbolic execution meth-ods for detecting heap buffer overflow vulnerabilities. Our findings suggest that theuse of machine learning algorithms can enhance the accuracy of unit-based symbolicexecution tools, which can be useful for detecting security vulnerabilities in software.

Place, publisher, year, edition, pages
2023. , p. 82
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:bth-24735OAI: oai:DiVA.org:bth-24735DiVA, id: diva2:1762685
Subject / course
Degree Project in Master of Science in Engineering 30,0 hp
Educational program
DVACD Master of Science in Computer Security
Supervisors
Examiners
Available from: 2023-06-21 Created: 2023-06-04 Last updated: 2023-06-21Bibliographically approved

Open Access in DiVA

fulltext(609 kB)43 downloads
File information
File name FULLTEXT01.pdfFile size 609 kBChecksum SHA-512
778766ff0fc5653d9aa7bd80a9bf92bacc551775badaa623fc0b759550fca4240c2e88696772b0a2250b893318b54651cbb8a9aec5ded23831e5c96d2be54653
Type fulltextMimetype application/pdf

By organisation
Department of Computer Science
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 43 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 126 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf