Securing software : an evaluation of static source code analyzers
暂无分享,去创建一个
[1] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[2] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[3] David Evans,et al. Statically Detecting Likely Buffer Overflow Vulnerabilities , 2001, USENIX Security Symposium.
[4] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[5] Dawson R. Engler,et al. Using programmer-written compiler extensions to catch security holes , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[6] John Wilander,et al. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention , 2003, NDSS.
[7] David A. Wagner,et al. MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.
[8] William R. Bush,et al. A static analyzer for finding dynamic programming errors , 2000, Softw. Pract. Exp..
[9] Gary McGraw,et al. An automated approach for identifying potential vulnerabilities in software , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[10] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, POPL '02.
[11] Gary McGraw,et al. ITS4: a static vulnerability scanner for C and C++ code , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[12] Matt Bishop,et al. Checking for Race Conditions in File Accesses , 1996, Comput. Syst..
[13] Patrick Cousot,et al. Static determination of dynamic properties of programs , 1976 .
[14] Ken Frazer,et al. Building secure software: how to avoid security problems the right way , 2002, SOEN.
[15] Arash Baratloo,et al. Libsafe: Protecting Critical Elements of Stacks , 2003 .
[16] Paul Anderson,et al. Software Inspection Using CodeSurfer , 2001 .
[17] CRISPIN COWAN,et al. Software Security for Open-Source Systems , 2003, IEEE Secur. Priv..
[18] Juha Röning,et al. Running Malicious Code By Exploiting Buffer Overflows: A Survey Of Publicly Available Exploits , 2000 .
[19] Mark E. Donaldson. INSIDE THE BUFFER OVERFLOW ATTACK: MECHANISM, METHOD, & PREVENTION , 2002 .
[20] Daniel P. Siewiorek,et al. Automated robustness testing of off-the-shelf software components , 1998, Digest of Papers. Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing (Cat. No.98CB36224).
[21] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[22] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .
[23] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[24] Dawson R. Engler,et al. ARCHER: using symbolic, path-sensitive analysis to detect memory access errors , 2003, ESEC/FSE-11.
[25] Calton Pu,et al. Buffer overflows: attacks and defenses for the vulnerability of the decade , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[26] David Evans,et al. Improving Security Using Extensible Lightweight Static Analysis , 2002, IEEE Softw..
[27] Vtt Publications,et al. A Functional Method for Assessing Protocol Implementation Security , 2001 .
[28] John Wilander,et al. A Comparison of Publicly Available Tools for Static Intrusion Prevention , 2002 .
[29] Paul H. J. Kelly,et al. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs , 1997, AADEBUG.
[30] Calton Pu,et al. Buffer overflows: attacks and defenses for the vulnerability of the decade , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[31] Gerardo Richarte. Four dierent tricks to bypass StackShield and StackGuard protection , 2002, WWW 2002.
[32] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[33] Donn Seeley,et al. A Tour of the Worm , 1988 .