Lightweight Wrappers for Interfacing with Binary Code in CCured

The wide use of separate compilation and precompiled libraries among programmers poses a challenge to source-code based security and analysis tools such as CCured. These tools must understand enough of the behavior of precompiled libraries that they can prevent any unsafe use of the library. The situation is even more complicated for instrumentation tools that change the layout of data to accommodate array bounds or other metadata that is necessary for safety checking.

[1]  Zhen Xiao,et al.  Detecting heap smashing attacks through fault containment wrappers , 2001, Proceedings 20th IEEE Symposium on Reliable Distributed Systems.

[2]  Akinori Yonezawa,et al.  The Interface Definition Language for Fail-Safe C , 2003, ISSS.

[3]  Yi-Min Wang,et al.  Xept: a software instrumentation method for exception handling , 1997, Proceedings The Eighth International Symposium on Software Reliability Engineering.

[4]  George C. Necula,et al.  CCured in the real world , 2003, PLDI '03.

[5]  Navjot Singh,et al.  Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.

[6]  Akinori Yonezawa,et al.  Software Security — Theories and Systems , 2003, Lecture Notes in Computer Science.

[7]  Zhen Xiao,et al.  An automated approach to increasing the robustness of C libraries , 2002, Proceedings International Conference on Dependable Systems and Networks.

[8]  William G. Griswold,et al.  Dynamically discovering likely program invariants to support program evolution , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).