Zero-sized Heap Allocations Vulnerability Analysis
暂无分享,去创建一个
[1] Alexander Aiken,et al. Scalable error detection using boolean satisfiability , 2005, POPL '05.
[2] Rafal Wojtczuk. UQBTng : a tool capable of automatically finding integer overflows in Win 32 binaries , .
[3] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.
[4] Gilles Dowek,et al. Principles of programming languages , 1981, Prentice Hall International Series in Computer Science.
[5] Alan J. Hu,et al. Calysto: scalable and precise extended static checking , 2008, ICSE.
[6] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[7] Mark N. Wegman,et al. Efficiently computing static single assignment form and the control dependence graph , 1991, TOPL.
[8] Zhe Yang,et al. Software validation via scalable path-sensitive value flow analysis , 2004, ISSTA '04.
[9] Alexander Aiken,et al. Flow-sensitive type qualifiers , 2002, PLDI '02.
[10] Lawrence Charles Paulson,et al. Isabelle: A Generic Theorem Prover , 1994 .
[11] William R. Bush,et al. A static analyzer for finding dynamic programming errors , 2000 .
[12] David A. Wagner,et al. Finding User/Kernel Pointer Bugs with Type Inference , 2004, USENIX Security Symposium.
[13] Natarajan Shankar,et al. PVS: Combining Specification, Proof Checking, and Model Checking , 1996, FMCAD.
[14] DasManuvir,et al. Software validation via scalable path-sensitive value flow analysis , 2004 .
[15] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[16] Thomas Dullien,et al. REIL: A platform-independent intermediate representation of disassembled code for static code analysis , 2009 .
[17] Bor-Yuh Evan Chang,et al. Boogie: A Modular Reusable Verifier for Object-Oriented Programs , 2005, FMCO.
[18] William R. Bush,et al. A static analyzer for finding dynamic programming errors , 2000, Softw. Pract. Exp..
[19] Tao Wei,et al. IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution , 2009, NDSS.
[20] Alexander Aiken,et al. Verifying the Safety of User Pointer Dereferences , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[21] Sriram K. Rajamani,et al. The SLAM project: debugging system software via static analysis , 2002, POPL '02.
[22] Thomas W. Reps,et al. CodeSurfer/x86-A Platform for Analyzing x86 Executables , 2005, CC.