An Empirical Study on Detecting and Fixing Buffer Overflow Bugs
暂无分享,去创建一个
Tao Ye | Xuandong Li | Lingming Zhang | Linzhang Wang | Linzhang Wang | Xuandong Li | Lingming Zhang | Tao Ye
[1] Gary McGraw,et al. ITS4: a static vulnerability scanner for C and C++ code , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[2] Guofei Gu,et al. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[3] Mary Lou Soffa,et al. Marple: a demand-driven path-sensitive buffer overflow detector , 2008, SIGSOFT '08/FSE-16.
[4] David Brumley,et al. AEG: Automatic Exploit Generation , 2011, NDSS.
[5] Steve Hanna,et al. A Symbolic Execution Framework for JavaScript , 2010, 2010 IEEE Symposium on Security and Privacy.
[6] Kendra J Kratkiewicz,et al. Evaluating Static Analysis Tools for Detecting Buffer Overflows in C Code , 2005 .
[7] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[8] Ming Fang,et al. Discovering buffer overflow vulnerabilities in the wild: an empirical study , 2014, ESEM '14.
[9] John Wilander,et al. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention , 2003, NDSS.
[10] Tao Wei,et al. IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution , 2009, NDSS.
[11] Robert W. Bowdidge,et al. Why don't software developers use static analysis tools to find bugs? , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[12] Dawson R. Engler,et al. ARCHER: using symbolic, path-sensitive analysis to detect memory access errors , 2003, ESEC/FSE-11.
[13] Paul H. J. Kelly,et al. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs , 1997, AADEBUG.
[14] Matt Bishop,et al. Testing C Programs for Buffer Overflow Vulnerabilities , 2003, NDSS.
[15] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[16] Gabriel Díaz,et al. Static analysis of source code security: Assessment of tools against SAMATE tests , 2013, Inf. Softw. Technol..
[17] David Brumley,et al. Enhancing symbolic execution with veritesting , 2014, ICSE.
[18] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.
[19] Konrad Rieck,et al. Modeling and Discovering Vulnerabilities with Code Property Graphs , 2014, 2014 IEEE Symposium on Security and Privacy.
[20] Rupak Majumdar,et al. Testing for buffer overflows with length abstraction , 2008, ISSTA '08.
[21] David Evans,et al. Improving Security Using Extensible Lightweight Static Analysis , 2002, IEEE Softw..
[22] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[23] David Evans,et al. Statically Detecting Likely Buffer Overflow Vulnerabilities , 2001, USENIX Security Symposium.
[24] Konrad Rieck,et al. Chucky: exposing missing checks in source code for vulnerability discovery , 2013, CCS.
[25] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, POPL '02.