Understanding integer overflow in C/C++
暂无分享,去创建一个
Peng Li | John Regehr | Will Dietz | Vikram S. Adve | J. Regehr | Will Dietz | Peng Li
[1] Bob Martin,et al. 2010 CWE/SANS Top 25 Most Dangerous Software Errors , 2010 .
[2] Nicholas Nethercote,et al. Valgrind: A Program Supervision Framework , 2003, RV@CAV.
[3] David A. Wagner,et al. Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs , 2009, USENIX Security Symposium.
[4] David Brumley,et al. RICH: Automatically Protecting Against Integer-Based Vulnerabilities , 2007, NDSS.
[5] Timothy Wilson,et al. As-If Infinitely Ranged Integer Model , 2010, 2010 IEEE 21st International Symposium on Software Reliability Engineering.
[6] John Regehr,et al. Understanding integer overflow in C/C++ , 2012, ICSE 2012.
[7] Nancy G. Leveson,et al. An investigation of the Therac-25 accidents , 1993, Computer.
[8] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[9] Giovanni Denaro,et al. ACM Transactions on Software Engineering and Methodology : Volume 22, Nomor 4, 2013 , 2014 .
[10] Tao Wei,et al. IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution , 2009, NDSS.
[11] Robert A. Martin,et al. Vulnerability Type Distributions in CVE , 2007 .
[12] Yi Wang,et al. BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability , 2009, 2009 International Conference on Availability, Reliability and Security.