Cleanness Checking of String Manipulations in C Programs via Integer Analysis
暂无分享,去创建一个
[1] Eugene H. Spafford,et al. Crisis and aftermath , 1989, Commun. ACM.
[2] Nicolas Halbwachs,et al. Automatic discovery of linear restraints among variables of a program , 1978, POPL.
[3] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[4] David Evans,et al. Statically Detecting Likely Buffer Overflow Vulnerabilities , 2001, USENIX Security Symposium.
[5] Nicolas Halbwachs,et al. Verification of Real-Time Systems using Linear Relation Analysis , 1997, Formal Methods Syst. Des..
[6] Eugene H. Spafford,et al. The internet worm: crisis and aftermath , 1989 .
[7] Barton P. Miller,et al. Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services , 1995 .
[8] Calton Pu,et al. Buffer overflows: attacks and defenses for the vulnerability of the decade , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[9] Thomas W. Reps,et al. Debugging via Run-Time Type Checking , 2001, FASE.
[10] Patrick Cousot,et al. Static determination of dynamic properties of programs , 1976 .
[11] Todd M. Austin,et al. Efficient detection of all pointer and array access errors , 1994, PLDI '94.
[12] Patrick Cousot,et al. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.
[13] Thomas W. Reps,et al. Pointer analysis for programs with structures and casting , 1999, PLDI '99.
[14] Brian W. Kernighan,et al. The C Programming Language , 1978 .