A Dynamically Linked Library Based Indirect Call Function Analysis for Detecting Banned API Usage in Binary Code
- Authors
- Jeong, Junho; Son, Yunsik
- Issue Date
- Mar-2018
- Publisher
- SERSC
- Keywords
- Code Analysis; Indirect Call; Vulnerable function; Secure Software
- Citation
- International Journal of Grid and Distributed Computing, v.11, no.3, pp 79 - 88
- Pages
- 10
- Indexed
- SCOPUS
ESCI
- Journal Title
- International Journal of Grid and Distributed Computing
- Volume
- 11
- Number
- 3
- Start Page
- 79
- End Page
- 88
- URI
- https://scholarworks.dongguk.edu/handle/sw.dongguk/9716
- DOI
- 10.14257/ijgdc.2018.11.3.07
- ISSN
- 2005-4262
- Abstract
- The use of Inherently Dangerous Function could cause vulnerabilities in a program which makes it disadvantageous. If the source code exits, this problem can easily be solved by simply removing the use of dangerous functions based on the list of prohibited functions. However, if only the binary code exits, it is difficult to analyze the list of functions used in the code. Furthermore, it is challenging to understand the information of functions used in analysis, such as reverse engineering, because a lot of the information in library functions that are linked dynamically in a typical binary file has been removed. In this paper, we propose a method to find indirectly called function information by using the information when calling a function in binary code based on indirect calling method used in the windows environment.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Advanced Convergence Engineering > Department of Computer Science and Artificial Intelligence > 1. Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.