Saluki: Finding Taint-style Vulnerabilities with Static Property Checking
暂无分享,去创建一个
David Brumley | Ivan Gotovchits | Rijnard Van Tonder | David Brumley | R. V. Tonder | Ivan Gotovchits
[1] Christopher Krügel,et al. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[2] Giovanni Vigna,et al. Static Detection of Vulnerabilities in x86 Executables , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[3] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[4] David Brumley,et al. Enhancing symbolic execution with veritesting , 2014, ICSE.
[5] Herbert Bos,et al. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations , 2013, USENIX Security Symposium.
[6] Joseph Sifakis,et al. Model checking , 1996, Handbook of Automated Reasoning.
[7] Dawson R. Engler,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Cmc: a Pragmatic Approach to Model Checking Real Code , 2022 .
[8] Thomas W. Reps,et al. WYSINWYX: What You See Is Not What You eXecute , 2005, VSTTE.
[9] Thorsten Holz,et al. Simulation of Built-in PHP Features for Precise Static Code Analysis , 2014, NDSS.
[10] David Brumley,et al. Optimizing Seed Selection for Fuzzing , 2014, USENIX Security Symposium.
[11] Scott Moore,et al. Exploring and enforcing security guarantees via program dependence graphs , 2015, PLDI.
[12] S. Rajamani,et al. A decade of software model checking with SLAM , 2011, Commun. ACM.
[13] William Landi,et al. Undecidability of static analysis , 1992, LOPL.
[14] David Brumley,et al. BYTEWEIGHT: Learning to Recognize Functions in Binary Code , 2014, USENIX Security Symposium.
[15] Nils Klarlund,et al. Software Model Checking: Searching for Computations in the Abstract or the Concrete , 2005, IFM.
[16] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[17] Benjamin Livshits,et al. Context-sensitive program analysis as database queries , 2005, PODS.
[18] Tzi-cker Chiueh,et al. A Forced Sampled Execution Approach to Kernel Rootkit Identification , 2007, RAID.
[19] Wei Tu,et al. Model checking an entire Linux distribution for security violations , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[20] David A. Wagner,et al. MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.
[21] George Candea,et al. S2E: a platform for in-vivo multi-path analysis of software systems , 2011, ASPLOS XVI.
[22] Dawson R. Engler,et al. A system and language for building system-specific, static analyses , 2002, PLDI '02.
[23] Konrad Rieck,et al. Modeling and Discovering Vulnerabilities with Code Property Graphs , 2014, 2014 IEEE Symposium on Security and Privacy.
[24] Benjamin Livshits,et al. Finding Security Vulnerabilities in Java Applications with Static Analysis , 2005, USENIX Security Symposium.
[25] Christopher Krügel,et al. Driller: Augmenting Fuzzing Through Selective Symbolic Execution , 2016, NDSS.
[26] Patrice Godefroid,et al. Billions and billions of constraints: Whitebox fuzz testing in production , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[27] Dawson R. Engler,et al. Checking system rules using system-specific, programmer-written compiler extensions , 2000, OSDI.
[28] David Brumley,et al. BAP: A Binary Analysis Platform , 2011, CAV.
[29] Roland Groz,et al. A Taint Based Approach for Smart Fuzzing , 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation.
[30] Sriram K. Rajamani,et al. The SLAM project: debugging system software via static analysis , 2002, POPL '02.
[31] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[32] Benjamin Livshits,et al. Finding application errors and security flaws using PQL: a program query language , 2005, OOPSLA '05.
[33] Benjamin C. Pierce,et al. Explicit Secrecy: A Policy for Taint Tracking , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[34] Patrice Godefroid,et al. Micro execution , 2014, ICSE.
[35] David Brumley,et al. Unleashing Mayhem on Binary Code , 2012, 2012 IEEE Symposium on Security and Privacy.
[36] Christopher Krügel,et al. Static analysis for detecting taint-style vulnerabilities in web applications , 2010, J. Comput. Secur..