MEBS: Uncovering Memory Life-Cycle Bugs in Operating System Kernels
暂无分享,去创建一个
Xu Zhou | Tai Yue | Gen Zhang | Kai Lu | Peng-Fei Wang
[1] Konrad Rieck,et al. Chucky: exposing missing checks in source code for vulnerability discovery , 2013, CCS.
[2] Kangjie Lu,et al. Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs , 2019, ESORICS.
[3] Peter J. Stuckey,et al. Resource Usage Verification , 2003, APLAS.
[4] ChouAndy,et al. Bugs as deviant behavior , 2001 .
[5] Vitaly Shmatikov,et al. RoleCast: finding missing security checks when you do not know what checks are , 2011, OOPSLA '11.
[6] Shiping Chen,et al. Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection , 2017, ACSAC.
[7] Wenwen Wang,et al. Check It Again: Detecting Lacking-Recheck Bugs in OS Kernels , 2018, CCS.
[8] Peng Liu,et al. CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump , 2016, CCS.
[9] David A. Wagner,et al. MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.
[10] Shengchao Qin,et al. State-taint analysis for detecting resource bugs , 2018, Sci. Comput. Program..
[11] Dawson R. Engler,et al. How to Build Static Checking Systems Using Orders of Magnitude Less Code , 2016, ASPLOS.
[12] Yi Li,et al. Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities , 2020, 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE).