메뉴 건너뛰기




Volumn 4, Issue 1, 2008, Pages 5-23

Static analysis by abstract interpretation: Application to the detection of heap overflows

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER PROGRAMMING; COMPUTER SOFTWARE; SECURITY OF DATA;

EID: 38849111784     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-007-0063-z     Document Type: Article
Times cited : (5)

References (47)
  • 1
    • 33749831548 scopus 로고    scopus 로고
    • Static analysis of string manipulations in critical embedded C programs
    • Yi, K. (ed.) Static Analysis, 13th International Symposium (SAS'06), Seoul, Korea, August 2006. Springer, Heidelberg
    • Allamigeon, X., Godard, W., Hymans, C.: Static analysis of string manipulations in critical embedded C programs. In: Yi, K. (ed.) Static Analysis, 13th International Symposium (SAS'06), Volume 4134 of Lecture Notes in Computer Science, pp. 35-51, Seoul, Korea, August 2006. Springer, Heidelberg (2006)
    • (2006) Lecture Notes in Computer Science , vol.4134 , pp. 35-51
    • Allamigeon, X.1    Godard, W.2    Hymans, C.3
  • 4
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society
    • Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: 14th IEEE Computer Security Foundations Workshop (CSFW-14), pp. 82-96, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society (2001)
    • (2001) 14th IEEE Computer Security Foundations Workshop (CSFW-14) , pp. 82-96
    • Blanchet, B.1
  • 5
    • 33751067991 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • Oakland, CA, May
    • Blanchet, B.: A computationally sound mechanized prover for security protocols. In: IEEE Symposium on Security and Privacy, pp. 140-154, Oakland, CA, May 2006
    • (2006) IEEE Symposium on Security and Privacy , pp. 140-154
    • Blanchet, B.1
  • 6
    • 38849137338 scopus 로고    scopus 로고
    • C Code Analyzer. http://www.drugphish.ch/~jonny/cca.html
    • C Code Analyzer
  • 7
    • 0036079901 scopus 로고    scopus 로고
    • Improving computer security using extended static checking
    • Washington, DC, USA, 2002. IEEE Computer Society
    • Chess, B.: Improving computer security using extended static checking. In: SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 160, Washington, DC, USA, 2002. IEEE Computer Society (2002)
    • (2002) SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy , pp. 160
    • Chess, B.1
  • 8
    • 0022706656 scopus 로고
    • Automatic verification of finite-state concurrent systems using temporal logic specifications
    • 2
    • Clarke E.M., Emerson E.A. and Sistla A.P. (1986). Automatic verification of finite-state concurrent systems using temporal logic specifications. ACM Trans. Program. Lang. Syst. 8(2): 244-263
    • (1986) ACM Trans. Program. Lang. Syst. , vol.8 , pp. 244-263
    • Clarke, E.M.1    Emerson, E.A.2    Sistla, A.P.3
  • 10
  • 11
    • 84972546036 scopus 로고
    • Constructive versions of Tarski's fixed point theorems
    • 1
    • Cousot P. and Cousot R. (1979). Constructive versions of Tarski's fixed point theorems. Pac. J. Math. 82(1): 43-57
    • (1979) Pac. J. Math. , vol.82 , pp. 43-57
    • Cousot, P.1    Cousot, R.2
  • 12
    • 0000963996 scopus 로고
    • Abstract interpretation frameworks
    • 4
    • Cousot P. and Cousot R. (1992). Abstract interpretation frameworks. J. Log. Comput. 2(4): 511-547
    • (1992) J. Log. Comput. , vol.2 , pp. 511-547
    • Cousot, P.1    Cousot, R.2
  • 14
    • 38849179521 scopus 로고    scopus 로고
    • Coverity
    • Coverity. http://www.coverity.com
  • 15
    • 84948134383 scopus 로고    scopus 로고
    • Counter-example based predicate discovery in predicate abstraction
    • Springer, Heidelberg, November
    • Das, S., Dill, D.L.: Counter-example based predicate discovery in predicate abstraction. In: Formal Methods in Computer-Aided Design. Springer, Heidelberg, November 2002
    • (2002) Formal Methods in Computer-aided Design
    • Das, S.1    Dill, D.L.2
  • 16
    • 33745765468 scopus 로고    scopus 로고
    • A local shape analysis based on separation logic
    • Hermanns, H., Palsberg, J. (eds.) Tools and Algorithms for the Construction and Analysis of Systems, 12th International Conference, TACAS 2006. Springer, Heidelberg, March
    • Distefano, D., O'Hearn, P.W., Yang, H.: A local shape analysis based on separation logic. In: Hermanns, H., Palsberg, J. (eds.) Tools and Algorithms for the Construction and Analysis of Systems, 12th International Conference, TACAS 2006, Volume 3920 of Lecture Notes in Computer Science, pp. 287-302. Springer, Heidelberg, March 2006
    • (2006) Lecture Notes in Computer Science , vol.3920 , pp. 287-302
    • Distefano, D.1    O'Hearn, P.W.2    Yang, H.3
  • 19
    • 0036147522 scopus 로고    scopus 로고
    • Improving security using extensible lightweight static analysis
    • 1
    • Evans D. and Larochelle D. (2002). Improving security using extensible lightweight static analysis. IEEE Softw. 19(1): 42-51
    • (2002) IEEE Softw. , vol.19 , pp. 42-51
    • Evans, D.1    Larochelle, D.2
  • 20
    • 0038382055 scopus 로고    scopus 로고
    • Verification of non-functional programs using interpretations in type theory
    • 4
    • Filliâtre J.-C. (2003). Verification of non-functional programs using interpretations in type theory. J. Funct. Program. 13(4): 709-745
    • (2003) J. Funct. Program. , vol.13 , pp. 709-745
    • Filliâtre, J.-C.1
  • 21
    • 35048862900 scopus 로고    scopus 로고
    • Multi-prover verification of C programs
    • Formal Methods and Software Engineering, 6th International Conference on Formal Engineering Methods, ICFEM 2004. Springer, Heideleberg
    • Filliâtre, J.-C., Marché, C.: Multi-prover verification of C programs. In: Formal Methods and Software Engineering, 6th International Conference on Formal Engineering Methods, ICFEM 2004. Volume 3308 of Lecture Notes in Computer Science, pp. 15-29. Springer, Heideleberg (2004)
    • (2004) Lecture Notes in Computer Science , vol.3308 , pp. 15-29
    • Filliâtre, J.-C.1    Marché, C.2
  • 22
    • 38849174511 scopus 로고    scopus 로고
    • Flawfinder
    • Flawfinder. http://www.dwheeler.com/flawfinder/
  • 23
    • 11844297937 scopus 로고    scopus 로고
    • International Organization for Standardization. International Organization for Standardization, Geneva, Switzerland, December
    • International Organization for Standardization. ISO/IEC 9899:1999: Programming Languages-C. International Organization for Standardization, Geneva, Switzerland, December 1999
    • (1999) ISO/IEC 9899:1999: Programming Languages-C
  • 24
    • 38849202573 scopus 로고    scopus 로고
    • Ganssle, J.: Big Code. http://www.embedded.com/columns/embeddedpulse/ 171203287?_requestid=1130518
    • Big Code
    • Ganssle, J.1
  • 25
    • 33749834079 scopus 로고    scopus 로고
    • Static analysis of numerical algorithms
    • Yi, K. (ed.) Static Analysis, 13th International Symposium (SAS'06), Seoul, Korea, August 2006. Springer Verlag
    • Goubault, E., Putot, S.: Static analysis of numerical algorithms. In: Yi, K. (ed.) Static Analysis, 13th International Symposium (SAS'06), Volume 4134 of Lecture Notes in Computer Science, pp. 18-5134, Seoul, Korea, August 2006. Springer Verlag (2006)
    • (2006) Lecture Notes in Computer Science , vol.4134 , pp. 18-5134
    • Goubault, E.1    Putot, S.2
  • 27
    • 38849126917 scopus 로고    scopus 로고
    • GNU grep
    • GNU grep. http://www.gnu.org/software/grep/
  • 28
    • 33749645624 scopus 로고    scopus 로고
    • Static source code checking for user-defined properties
    • Pasadena, CA, USA
    • Holzmann, G.J.: Static source code checking for user-defined properties. In: Proceedings IDPT 2002, Pasadena, CA, USA (2002)
    • (2002) Proceedings IDPT 2002
    • Holzmann, G.J.1
  • 31
    • 33646050367 scopus 로고    scopus 로고
    • Taming false alarms from a domain-unaware C analyzer by a bayesian statistical post analysis
    • Siveroni, I., Hankin, C. (eds.) Static Analysis: 12th International Symposium, SAS 2005, London, UK, September 7-9, 2005. Springer Verlag
    • Jung, Y., Kim, J., Shin, J., Yi, K.: Taming false alarms from a domain-unaware C analyzer by a bayesian statistical post analysis. In: Siveroni, I., Hankin, C. (eds.) Static Analysis: 12th International Symposium, SAS 2005, London, UK, September 7-9, 2005. Proceedings, Lecture Notes in Computer Science, pp. 203-217. Springer Verlag (2005)
    • (2005) Proceedings, Lecture Notes in Computer Science , pp. 203-217
    • Jung, Y.1    Kim, J.2    Shin, J.3    Yi, K.4
  • 32
    • 0016881880 scopus 로고
    • Affine relationships among variables of a program
    • Karr M. (1976). Affine relationships among variables of a program. Acta Inf. 6: 133-151
    • (1976) Acta Inf. , vol.6 , pp. 133-151
    • Karr, M.1
  • 33
    • 84944203825 scopus 로고    scopus 로고
    • Automatic inference of class invariants
    • Proceedings of the 5th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI '04) January 2004. Springer Verlag
    • Logozzo, F.: Automatic inference of class invariants. In: Proceedings of the 5th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI '04), Volume 2937 of Lectures Notes in Computer Science, January 2004. Springer Verlag (2004)
    • (2004) Lectures Notes in Computer Science , vol.2937
    • Logozzo, F.1
  • 34
    • 84888254089 scopus 로고    scopus 로고
    • A new numerical abstract domain based on difference-bound matrices
    • PADO II May Springer Verlag
    • Miné, A.: A new numerical abstract domain based on difference-bound matrices. In: PADO II, Volume 2053 of LNCS, pp. 155-172, May 2001. Springer Verlag. http://www.di.ens.fr/~mine/publi/article-mine-padoII.pdf
    • (2001) LNCS , vol.2053 , pp. 155-172
    • Miné, A.1
  • 35
    • 0034781047 scopus 로고    scopus 로고
    • The octagon abstract domain
    • IEEE IEEE CS Press, October
    • Miné, A.: The octagon abstract domain. In: AST 2001 in WCRE 2001, IEEE, pp. 310-319. IEEE CS Press, October 2001. http://www.di.ens.fr/~mine/ publi/article-mine-ast01.pdf
    • (2001) AST 2001 in WCRE 2001 , pp. 310-319
    • Miné, A.1
  • 36
    • 33746057438 scopus 로고    scopus 로고
    • Field-sensitive value analysis of embedded C programs with union types and pointer arithmetics
    • ACM, New York, June
    • Miné, A.: Field-sensitive value analysis of embedded C programs with union types and pointer arithmetics. In: ACM SIGPLAN LCTES'06, pp. 54-63. ACM, New York, June 2006. http://www.di.ens.fr/~mine/publi/article-mine-lctes06. pdf
    • (2006) ACM SIGPLAN LCTES'06 , pp. 54-63
    • Miné, A.1
  • 38
    • 38849166771 scopus 로고    scopus 로고
    • Polyspace. http://www.polyspace.com
  • 39
    • 0000389603 scopus 로고
    • On completely recursively enumerable classes and their key arrays
    • 3
    • Rice H.G. (1956). On completely recursively enumerable classes and their key arrays. J. Symb. Log. 21(3): 304-308
    • (1956) J. Symb. Log. , vol.21 , pp. 304-308
    • Rice, H.G.1
  • 42
    • 24144461197 scopus 로고    scopus 로고
    • Scalable analysis of linear systems using mathematical programming
    • Cousot, R. (ed.) Verification, Model Checking and Abstract Interpretation: Proceedings of the 6th International Conference (VMCAI 2005), Paris, France, 2005. Springer, Berlin
    • Sankaranarayanan, S., Sipma, H.B., Manna, Z.: Scalable analysis of linear systems using mathematical programming. In: Cousot, R. (ed.) Verification, Model Checking and Abstract Interpretation: Proceedings of the 6th International Conference (VMCAI 2005), Volume 3385 of Lecture Notes in Computer Science, pp. 25-41, Paris, France, 2005. Springer, Berlin (2005)
    • (2005) Lecture Notes in Computer Science , vol.3385 , pp. 25-41
    • Sankaranarayanan, S.1    Sipma, H.B.2    Manna, Z.3
  • 43
    • 84972541021 scopus 로고
    • A lattice-theoretical fixpoint theorem and its applications
    • Tarski A. (1955). A lattice-theoretical fixpoint theorem and its applications. Pac. J. Math. 5: 285-309
    • (1955) Pac. J. Math. , vol.5 , pp. 285-309
    • Tarski, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.