메뉴 건너뛰기




Volumn 4134 LNCS, Issue , 2006, Pages 35-51

Static analysis of string manipulations in critical embedded C programs

Author keywords

[No Author keywords available]

Indexed keywords

C (PROGRAMMING LANGUAGE); CACHE MEMORY; COMPUTER SOFTWARE; EMBEDDED SYSTEMS; ERROR ANALYSIS;

EID: 33749831548     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11823230_4     Document Type: Conference Paper
Times cited : (11)

References (31)
  • 1
    • 33645597073 scopus 로고    scopus 로고
    • The advantage of block-based protocol analysis for security testing
    • Immunity,Inc.
    • Dave Aitel. The advantage of block-based protocol analysis for security testing. Technical report, Immunity,Inc., 2002.
    • (2002) Technical Report
    • Aitel, D.1
  • 3
    • 84883670705 scopus 로고    scopus 로고
    • Philippe Biondi. Scapy. http://www.secdev.org/projects/scapy/.
    • Scapy
    • Biondi, P.1
  • 4
    • 84905494891 scopus 로고    scopus 로고
    • Improving computer security using extended static checking
    • B. Chess. Improving computer security using extended static checking. In IEEE Symposium on Security and Privacy, 2002.
    • (2002) IEEE Symposium on Security and Privacy
    • Chess, B.1
  • 5
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • ACM Press
    • P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Conference Record of the 4th ACM Symposium on Principles of Programming Languages. ACM Press, 1977
    • (1977) Conference Record of the 4th ACM Symposium on Principles of Programming Languages
    • Cousot, P.1    Cousot, R.2
  • 6
    • 84972546036 scopus 로고
    • Constructive versions of Tarski's fixed point theorems
    • P. Cousot and R. Cousot. Constructive versions of Tarski's fixed point theorems. Pacific Journal of Mathematics, 81(1), 1979
    • (1979) Pacific Journal of Mathematics , vol.81 , Issue.1
    • Cousot, P.1    Cousot, R.2
  • 8
    • 85084160243 scopus 로고    scopus 로고
    • StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
    • USENIX Association
    • C. Cowan and al. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium. USENIX Association, 1998.
    • (1998) Proceedings of the 7th USENIX Security Symposium
    • Cowan, C.1
  • 11
    • 0036147522 scopus 로고    scopus 로고
    • Improving security using extensible lightweight static analysis
    • David Evans and David Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, 19(1), 2002.
    • (2002) IEEE Software , vol.19 , Issue.1
    • Evans, D.1    Larochelle, D.2
  • 14
    • 33646050367 scopus 로고    scopus 로고
    • Taming false alarms from a domain-unaware C analyzer by a bayesian statistical post analysis
    • Static Analysis, 12th International Symposium, Springer
    • Yungbum Jung, Jaehwang Kim, Jaeho Shin, and Kwangkeun Yi. Taming false alarms from a domain-unaware C analyzer by a bayesian statistical post analysis. In Static Analysis, 12th International Symposium, volume 3672 of Lecture Notes in Computer Science. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3672
    • Jung, Y.1    Kim, J.2    Shin, J.3    Yi, K.4
  • 19
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One. Smashing the stack for fun and profit. Phrack, 7(49), 1996.
    • (1996) Phrack , vol.7 , Issue.49
    • One, A.1
  • 28
    • 34247546866 scopus 로고    scopus 로고
    • A comparison of publicly available tools for dynamic buffer overflow prevention
    • The Internet Society
    • John Wilander and Mariam Kamkar. A comparison of publicly available tools for dynamic buffer overflow prevention. In Network and Distributed System Security Symposium. The Internet Society, 2003.
    • (2003) Network and Distributed System Security Symposium
    • Wilander, J.1    Kamkar, M.2
  • 31
    • 26544441234 scopus 로고    scopus 로고
    • Yet another ensemble of abstract interpreter, higher-order data-flow equations, and model checking
    • Research on Program Analysis System, National Creative Research Center, Korea Advanced Institute of Science and Technology
    • K. Yi. Yet another ensemble of abstract interpreter, higher-order data-flow equations, and model checking. Technical Memorandum 2001-10, Research on Program Analysis System, National Creative Research Center, Korea Advanced Institute of Science and Technology, 2001.
    • (2001) Technical Memorandum , vol.2001 , Issue.10
    • Yi, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.