Evaluating Static Analysis Tools for Detecting Buffer Overflows in C Code
暂无分享,去创建一个
[1] Gerard J. Holzmann,et al. UNO: Static Source Code Checking for User-Defined Properties 1 , 2002 .
[2] Olatunji Ruwase,et al. A Practical Dynamic Buffer Overflow Detector , 2004, NDSS.
[3] David Evans,et al. Improving Security Using Extensible Lightweight Static Analysis , 2002, IEEE Softw..
[4] Richard Lippmann,et al. Testing static analysis tools using exploitable buffer overflows from open source code , 2004, SIGSOFT '04/FSE-12.
[5] Alain Deutsch,et al. Interprocedural may-alias analysis for pointers: beyond k-limiting , 1994, PLDI '94.
[6] Dawson R. Engler,et al. ARCHER: using symbolic, path-sensitive analysis to detect memory access errors , 2003, ESEC/FSE-11.
[7] Stefan Savage,et al. The Spread of the Sapphire/Slammer Worm , 2003 .
[8] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[9] David Evans,et al. Statically Detecting Likely Buffer Overflow Vulnerabilities , 2001, USENIX Security Symposium.
[10] William R. Bush,et al. A static analyzer for finding dynamic programming errors , 2000 .
[11] William R. Bush,et al. A static analyzer for finding dynamic programming errors , 2000, Softw. Pract. Exp..
[12] Misha Zitser. Securing software : an evaluation of static source code analyzers , 2003 .
[13] William Landi,et al. Undecidability of static analysis , 1992, LOPL.
[14] Eugene W. Myers,et al. A precise inter-procedural data flow algorithm , 1981, POPL '81.
[15] Gary McGraw,et al. ITS4: a static vulnerability scanner for C and C++ code , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[16] Alain Deutsch,et al. On the complexity of escape analysis , 1997, POPL '97.
[17] Eugene H. Spafford,et al. Software vulnerability analysis , 1998 .
[18] Patrick Cousot,et al. Static determination of dynamic properties of programs , 1976 .
[19] Douglas Gregor,et al. Retaining Path-Sensitive Relations Across Control-Flow Merges , 2003 .