메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 312-321

Automatic discovery of API-level exploits

Author keywords

API level exploit; Bounded model checking

Indexed keywords

APPLICATION PROGRAMMING INTERFACE (API); BOUNDED MODEL CHECKING; IBM (CO); SOFTWARE COMPONENTS;

EID: 26944470937     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSE.2005.1553574     Document Type: Conference Paper
Times cited : (18)

References (40)
  • 7
    • 0036980185 scopus 로고    scopus 로고
    • Korat: Automated testing based on Java predicates
    • ACM
    • C. Boyapati, S. Khurshid, and D. Marinov. Korat: Automated testing based on Java predicates. In Proc. ISSTA. ACM, 2002.
    • (2002) Proc. ISSTA
    • Boyapati, C.1    Khurshid, S.2    Marinov, D.3
  • 8
    • 84937570704 scopus 로고    scopus 로고
    • Modeling and verifying systems using a logic of counter arithmetic with lambda expressions and uninterpreted functions
    • LNCS 2404. Springer
    • th CAV, LNCS 2404. Springer, 2002.
    • (2002) th CAV
    • Bryant, R.E.1    Lahiri, S.K.2    Seshia, S.A.3
  • 9
    • 0012085727 scopus 로고    scopus 로고
    • Model-checking concurrent systems with unbounded integer variables: Symbolic representations, approximations, and experimental results
    • T. Bultan, R. Gerber, and W. Pugh. Model-checking concurrent systems with unbounded integer variables: Symbolic representations, approximations, and experimental results. ACM TOPLAS, 21(4):747-789, 1999.
    • (1999) ACM TOPLAS , vol.21 , Issue.4 , pp. 747-789
    • Bultan, T.1    Gerber, R.2    Pugh, W.3
  • 10
    • 0038349200 scopus 로고    scopus 로고
    • MOPS: An infrastructure for examining security properties of software
    • ACM
    • th CCS. ACM, 2002.
    • (2002) th CCS
    • Chen, H.1    Wagner, D.2
  • 14
    • 84948958346 scopus 로고    scopus 로고
    • Lazy theorem proving for bounded model checking over infinite domains
    • LNCS 2392. Springer
    • L. de Moura, H. Rueß, and M. Sorea. Lazy theorem proving for bounded model checking over infinite domains. In Proc. CADE, LNCS 2392. Springer, 2002.
    • (2002) Proc. CADE
    • De Moura, L.1    Rueß, H.2    Sorea, M.3
  • 20
  • 23
    • 33244457266 scopus 로고    scopus 로고
    • Automating first-order relational logic
    • ACM
    • D. Jackson. Automating first-order relational logic. In Proc. FSE. ACM, 2000.
    • (2000) Proc. FSE
    • Jackson, D.1
  • 24
    • 33244490325 scopus 로고
    • Common cryptographic architecture cryptographic application programming interface
    • D. B. Johnson, G. M. Dolan, M. J. Kelly, A. V. Le, and S. M. Matyas. Common cryptographic architecture cryptographic application programming interface. IBM Systems Journal, 30(2):130-150, 1991.
    • (1991) IBM Systems Journal , vol.30 , Issue.2 , pp. 130-150
    • Johnson, D.B.1    Dolan, G.M.2    Kelly, M.J.3    Le, A.V.4    Matyas, S.M.5
  • 25
    • 0036038149 scopus 로고    scopus 로고
    • Denali: A goal-directed superoptimizer
    • ACM
    • R. Joshi, G. Nelson, and K. Randall. Denali: A goal-directed superoptimizer. In Proc. PLDI. ACM, 2002.
    • (2002) Proc. PLDI
    • Joshi, R.1    Nelson, G.2    Randall, K.3
  • 26
    • 0023592629 scopus 로고
    • Superoptimizer - A look at the smallest program
    • ACM
    • nd ASPLOS. ACM, 1987.
    • (1987) nd ASPLOS
    • Massalin, H.1
  • 27
    • 0002951877 scopus 로고
    • A key management scheme based on control vectors
    • S. M. Matyas, A. V. Le, and D. G. Abraham. A key management scheme based on control vectors. IBM Systems Journal, 30(2):175-191, 1991.
    • (1991) IBM Systems Journal , vol.30 , Issue.2 , pp. 175-191
    • Matyas, S.M.1    Le, A.V.2    Abraham, D.G.3
  • 28
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL Protocol Analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 32
  • 34
    • 2942671018 scopus 로고    scopus 로고
    • Siege SAT solver, http://www.cs.sfu.ca/~loryan/personal.
    • Siege SAT Solver
  • 39
    • 85081874807 scopus 로고    scopus 로고
    • A first step towards automated detection of buffer overrun vulnerabilities
    • ISOC
    • D. Wagner, J. S. Foster, E. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Proc. NDSS. ISOC, 2000.
    • (2000) Proc. NDSS
    • Wagner, D.1    Foster, J.S.2    Brewer, E.3    Aiken, A.4
  • 40
    • 32344437737 scopus 로고    scopus 로고
    • Scalable error detection using Boolean satisfiability
    • ACM
    • nd POPL. ACM, 2005.
    • (2005) nd POPL
    • Xie, Y.1    Aiken, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.