메뉴 건너뛰기




Volumn , Issue , 2008, Pages 247-256

Convicting exploitable software vulnerabilities: An efficient input provenance based approach

Author keywords

[No Author keywords available]

Indexed keywords

BINARY DECISION; DATA LINEAGE TRACING; DEPENDABLE SYSTEMS; DYNAMIC APPROACH; FALSE POSITIVE RATE; FALSE POSITIVES; INPUT VALUES; INTERNATIONAL CONFERENCES; OFF-LINE ANALYSIS; ROOT CAUSES; SECURITY VULNERABILITIES; SOFTWARE VULNERABILITIES; SOURCE CODING; SYSTEM ADMINISTRATORS;

EID: 53349100043     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2008.4630093     Document Type: Conference Paper
Times cited : (28)

References (24)
  • 1
    • 53349176525 scopus 로고    scopus 로고
    • http://www.dwheeler.com/flawfinder/
  • 2
    • 53349173130 scopus 로고    scopus 로고
    • http://www.fortifysoftware.com/security-resources/rats.jsp
  • 3
    • 53349152894 scopus 로고    scopus 로고
    • http://diablo.elis.ugent.be
  • 4
    • 53349173129 scopus 로고    scopus 로고
    • Buddy, a binary decision diagram package. Department of Information Technology, Technical Univ. of Denmark
    • Buddy, a binary decision diagram package. Department of Information Technology, Technical Univ. of Denmark.
  • 6
    • 35448955692 scopus 로고    scopus 로고
    • Valgrind: A Framework for Heavyweight Dynamic Binary Instrumentation. N. Nethercote and J. Seward. In Proc. of ACMPLDI, June 2007.
    • Valgrind: A Framework for Heavyweight Dynamic Binary Instrumentation. N. Nethercote and J. Seward. In Proc. of ACMPLDI, June 2007.
  • 7
    • 0025557712 scopus 로고    scopus 로고
    • B.P. Miller, L. Fredriksen, and B. So. An Empirical Study of the Reliability of UNIX Utilities. Communications of the ACM 33, 12, Dec. 1990.
    • B.P. Miller, L. Fredriksen, and B. So. An Empirical Study of the Reliability of UNIX Utilities. Communications of the ACM 33, 12, Dec. 1990.
  • 11
    • 33745254726 scopus 로고    scopus 로고
    • P. Godefroid, N. Klarlund, and K. Sen. Dart: Directed automated random testing. In Proc. of ACM PLDI, 2005.
    • P. Godefroid, N. Klarlund, and K. Sen. Dart: Directed automated random testing. In Proc. of ACM PLDI, 2005.
  • 13
    • 85128730845 scopus 로고    scopus 로고
    • Automated whitebox fuzz testing
    • San Deigo, CA, Feb
    • P. Godefroid, M. Levin, and D. Moinar. Automated whitebox fuzz testing. In Proc. of NDSS, San Deigo, CA, Feb. 2008.
    • (2008) Proc. of NDSS
    • Godefroid, P.1    Levin, M.2    Moinar, D.3
  • 15
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • Feb
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software.. In Proc. of NDSS, Feb. 2005.
    • (2005) Proc. of NDSS
    • Newsome, J.1    Song, D.2
  • 16
    • 33646767376 scopus 로고    scopus 로고
    • Control-Flow Integrity: Principles, Implementations, and Applications
    • Nov
    • M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-Flow Integrity: Principles, Implementations, and Applications. In Proc of ACM CCS, Nov. 2005.
    • (2005) Proc of ACM CCS
    • Abadi, M.1    Budiu, M.2    Erlingsson, U.3    Ligatti, J.4
  • 17
    • 84991997276 scopus 로고    scopus 로고
    • Securing Software by Enforcing Data-flow Integrity
    • Nov
    • M. Castro, M. Costa, and T. Harris. Securing Software by Enforcing Data-flow Integrity. In Proc. of OSDI, Nov. 2006.
    • (2006) Proc. of OSDI
    • Castro, M.1    Costa, M.2    Harris, T.3
  • 18
    • 85081874807 scopus 로고    scopus 로고
    • A first step towards automated detection of buffer overrun vulnerabilities
    • Feb
    • D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Proc. of NDSS, Feb. 2000.
    • (2000) Proc. of NDSS
    • Wagner, D.1    Foster, J.S.2    Brewer, E.A.3    Aiken, A.4
  • 19
    • 85084164558 scopus 로고    scopus 로고
    • Statically Detecting Likely Buffer Overflow Vulnerabilities
    • D. Larochelle and D. Evans. Statically Detecting Likely Buffer Overflow Vulnerabilities. In Proc. of USENIX Security, 2001.
    • (2001) Proc. of USENIX Security
    • Larochelle, D.1    Evans, D.2
  • 20
    • 85088735010 scopus 로고    scopus 로고
    • Testing Static Analysis Tools Using Exploitable Buffer Overflows From Open Source Code
    • M. Zitser, D. Shaw, T. Leek and R. Lippman. Testing Static Analysis Tools Using Exploitable Buffer Overflows From Open Source Code. In Proc. of ACM ESEC/FSE-11, 2004.
    • (2004) Proc. of ACM ESEC/FSE-11
    • Zitser, M.1    Shaw, D.2    Leek, T.3    Lippman, R.4
  • 21
    • 77954524963 scopus 로고    scopus 로고
    • Archer: Using symbolic, path-sensitive analysis to detect memory access errors
    • Y. Xie, A. Chou, and D. Engler. Archer: using symbolic, path-sensitive analysis to detect memory access errors. In Proc. of ACM ESEC/FSE-10, 2003.
    • (2003) Proc. of ACM ESEC/FSE-10
    • Xie, Y.1    Chou, A.2    Engler, D.3
  • 24
    • 4544331311 scopus 로고    scopus 로고
    • Efficient forward computation of dynamic slices using reduced ordered binary decision diagrams
    • X. Zhang, R. Gupta, and Y. Zhang. Efficient forward computation of dynamic slices using reduced ordered binary decision diagrams. In Proc. of ICSE, 2004.
    • (2004) Proc. of ICSE
    • Zhang, X.1    Gupta, R.2    Zhang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.