基于函数调用图分析的 C/C++ 第三方库漏洞影响分析方法

C/C++ THIRD PARTY LIBRARY'S VULNERABILITY IMPACT ANALYSIS METHOD BASED ON CALL GRAPH ANALYSIS

  • 摘要: 针对工业界软件成分分析工具第三方库漏洞扫描粒度过粗而导致的假阳性误报问题,提出一种基于函数调用图分析的 C/C++ 第三方库漏洞影响分析方法。该方法分析第三方库漏洞是否通过软件项目的函数调用图可达到新第三方库漏洞是否会对软件项目产生影响;提供细粒度的、函数级别的、更加准确的第三方库漏洞影响分析。实验表明,该方法的查准率为 94%,查全率为 77%,能减少约 80% 由于扫描粒度过粗而导致的误报。

     

    Abstract: To eliminate the false positives caused by coarse-grained impact analysis of existing software component analysis tools, a C/C++ third party library (TPL)'s vulnerability impact analysis method based on call graph analysis is proposed. The method evaluated the impact of TPL vulnerabilities by checking whether the TPL vulnerabilities were reachable through the call graph of the software, which provided a fine-grained, method-level and accurate TPL vulnerability impact analysis. The experiments show that the method achieves a precision of 94% and a recall of 77%, and reduces 80% of the false positives caused by coarse-grained impact analysis.

     

/

返回文章
返回