메뉴 건너뛰기




Volumn , Issue , 2009, Pages 442-452

Finding bugs in exceptional situations of JNI programs

Author keywords

Java native interface; Static analysis; Taint analysis

Indexed keywords

ERROR-PRONE PROCESS; EXCEPTION ANALYSIS; FOREIGN FUNCTION INTERFACE; JAVA NATIVE INTERFACE; JAVA NATIVE INTERFACES; JAVA VIRTUAL MACHINES; LINES OF CODE; NATIVE CODE; SECURITY FLAWS;

EID: 74049147430     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653716     Document Type: Conference Paper
Times cited : (59)

References (34)
  • 1
    • 0036086884 scopus 로고    scopus 로고
    • Using programmer-written compiler extensions to catch security holes
    • Washington, DC, USA, IEEE Computer Society
    • K. Ashcraft and D. Engler. Using programmer-written compiler extensions to catch security holes. In IEEE Symposium on Security and Privacy (S&P), pages 143-159, Washington, DC, USA, 2002. IEEE Computer Society.
    • (2002) IEEE Symposium on Security and Privacy (S&P) , pp. 143-159
    • Ashcraft, K.1    Engler, D.2
  • 7
    • 74049134182 scopus 로고    scopus 로고
    • S. D. Gathman. java-posix. http://www.bmsi.com/java/posix/package.html. Fetched on August 7, 2009.
    • S. D. Gathman. java-posix. http://www.bmsi.com/java/posix/package.html. Fetched on August 7, 2009.
  • 8
    • 74049136698 scopus 로고    scopus 로고
    • The java-gnome user interface library. http://java-gnome.sourceforge.net/ . Fetched on August 7, 2009.
    • The java-gnome user interface library. http://java-gnome.sourceforge.net/ . Fetched on August 7, 2009.
  • 9
    • 74049106419 scopus 로고    scopus 로고
    • Fetched on
    • JOGL API project, August 7
    • JOGL API project. https://jogl.dev.java.net/. Fetched on August 7, 2009.
    • (2009)
  • 10
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities (short paper)
    • N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In IEEE Symposium on Security and Privacy (S&P), pages 258-263, 2006.
    • (2006) IEEE Symposium on Security and Privacy (S&P) , pp. 258-263
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 14
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in Java applications with static analysis
    • B. Livshits and M. Lam. Finding security vulnerabilities in Java applications with static analysis. In 14th Usenix Security Symposium, pages 271-286, 2005.
    • (2005) 14th Usenix Security Symposium , pp. 271-286
    • Livshits, B.1    Lam, M.2
  • 18
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic dedection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic dedection, analysis, and signature generation of exploits on commodity software. In Network and Distributed System Security Symposium(NDSS), 2005.
    • (2005) Network and Distributed System Security Symposium(NDSS)
    • Newsome, J.1    Song, D.2
  • 19
    • 84871349041 scopus 로고    scopus 로고
    • A. Nguyen-tuong, S. Guarnieri, D. Greene, and D. Evans. Automatically hardening web applications using precise tainting. In In 20th IFIP International Information Security Conference, pages 372-382, 2005.
    • A. Nguyen-tuong, S. Guarnieri, D. Greene, and D. Evans. Automatically hardening web applications using precise tainting. In In 20th IFIP International Information Security Conference, pages 372-382, 2005.
  • 21
    • 74049158811 scopus 로고    scopus 로고
    • Python/C API reference manual. http://docs.python.org/c-api/index.html, Apr. 2009.
    • Python/C API reference manual. http://docs.python.org/c-api/index.html, Apr. 2009.
  • 23
    • 22944452575 scopus 로고    scopus 로고
    • Static analysis to support the evolution of exception structure in object-oriented systems
    • M. P. Robillard and G. C. Murphy. Static analysis to support the evolution of exception structure in object-oriented systems. ACM Transactions on Programming Languages and Systems, 12(2):191-221, 2003.
    • (2003) ACM Transactions on Programming Languages and Systems , vol.12 , Issue.2 , pp. 191-221
    • Robillard, M.P.1    Murphy, G.C.2
  • 24
    • 74049157231 scopus 로고    scopus 로고
    • M. Schoenefeld. Denial-of-service holes in JDK 1.3.1 and 1.4.1 01. Retrieved Apr 26th, 2008, from http://www.illegalaccess.org/java/ZipBugs.php, 2003.
    • M. Schoenefeld. Denial-of-service holes in JDK 1.3.1 and 1.4.1 01. Retrieved Apr 26th, 2008, from http://www.illegalaccess.org/java/ZipBugs.php, 2003.
  • 25
    • 85084164620 scopus 로고    scopus 로고
    • U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type quali.ers. In In Proceedings of the 10th USENIX Security Symposium, pages 201-220, 2001.
    • U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type quali.ers. In In Proceedings of the 10th USENIX Security Symposium, pages 201-220, 2001.
  • 26
    • 0022605097 scopus 로고
    • Typestate: A programming language concept for enhancing software reliability
    • R. E. Strom and S. Yemini. Typestate: A programming language concept for enhancing software reliability. IEEE Transactions on Software Engineering, 12(1):157-171, 1986.
    • (1986) IEEE Transactions on Software Engineering , vol.12 , Issue.1 , pp. 157-171
    • Strom, R.E.1    Yemini, S.2
  • 28
    • 70350696147 scopus 로고    scopus 로고
    • An empirical security study of the native code in the JDK
    • G. Tan and J. Croft. An empirical security study of the native code in the JDK. In 17th Usenix Security Symposium, pages 365-377, 2008.
    • (2008) 17th Usenix Security Symposium , pp. 365-377
    • Tan, G.1    Croft, J.2
  • 29
    • 74049138510 scopus 로고    scopus 로고
    • US-CERT. Vulnerability note VU#138545: Java Runtime Environment image parsing code buffer overflow vulnerability, June 2007. Credit goes to Chris Evans.
    • US-CERT. Vulnerability note VU#138545: Java Runtime Environment image parsing code buffer overflow vulnerability, June 2007. Credit goes to Chris Evans.
  • 30
    • 74049088846 scopus 로고    scopus 로고
    • US-CERT. Vulnerability note VU#939609: Sun Java JRE vulnerable to arbitrary code execution via an unspecified error, Jan. 2007. Credit goes to Chris Evans.
    • US-CERT. Vulnerability note VU#939609: Sun Java JRE vulnerable to arbitrary code execution via an unspecified error, Jan. 2007. Credit goes to Chris Evans.
  • 32
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • Berkeley, CA, USA, USENIX Association
    • Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In 15th Usenix Security Symposium, pages 179-192, Berkeley, CA, USA, 2006. USENIX Association.
    • (2006) 15th Usenix Security Symposium , pp. 179-192
    • Xie, Y.1    Aiken, A.2
  • 34
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • Berkeley, CA, USA, USENIX Association
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks. In 15th Usenix Security Symposium, Berkeley, CA, USA, 2006. USENIX Association.
    • (2006) 15th Usenix Security Symposium
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.