-
5
-
-
76549109833
-
-
Cve version: 20061101. CVE (2006), http://www.cve.mitre.org/cgi-bin/ cvekey.cgi?keyword=integer
-
Cve version: 20061101. CVE (2006), http://www.cve.mitre.org/cgi-bin/ cvekey.cgi?keyword=integer
-
-
-
-
9
-
-
79952020076
-
Rich: Automatically protecting against integer-based vulnerabilities
-
Brumley, D., cker Chiueh, T., Johnson, R., Lin, H., Song, D.: Rich: Automatically protecting against integer-based vulnerabilities. In: Proceedings of the 14th Annual Network and Distributed System Security, NDSS (2007)
-
(2007)
Proceedings of the 14th Annual Network and Distributed System Security, NDSS
-
-
Brumley, D.1
cker Chiueh, T.2
Johnson, R.3
Lin, H.4
Song, D.5
-
10
-
-
70349857932
-
Brick: A binary tool for run-time detecting and locating integer-based vulnerability
-
Chen, P.,Wang, Y., Xin, Z., Mao, B., Xie, L.: Brick: A binary tool for run-time detecting and locating integer-based vulnerability. In: International Conference on Availability, Reliability and Security, pp. 208-215 (2009)
-
(2009)
International Conference on Availability, Reliability and Security
, pp. 208-215
-
-
Chen, P.1
Wang, Y.2
Xin, Z.3
Mao, B.4
Xie, L.5
-
11
-
-
56249126470
-
Flow-insensitive static analysis for detecting integer anomalies in programs
-
ACTA Press, Anaheim
-
Dipanwita, S., Muthu, J., Jay, T., Ramanathan, V.: Flow-insensitive static analysis for detecting integer anomalies in programs. In: Proceedings of the 25th conference on IASTED International Multi-Conference (SE 2007), pp. 334-340. ACTA Press, Anaheim (2007)
-
(2007)
Proceedings of the 25th conference on IASTED International Multi-Conference (SE
, pp. 334-340
-
-
Dipanwita, S.1
Muthu, J.2
Jay, T.3
Ramanathan, V.4
-
13
-
-
85011293817
-
Lclint:a tool for using specification to check code
-
Evans, D., Guttag, J., Horning, J., Tan, Y.M.: Lclint:a tool for using specification to check code. In: Proceedings of the ACM SIGSOFT 1994 Symposium on the Foundations of Software Engineering, pp. 87-96 (1994)
-
(1994)
Proceedings of the ACM SIGSOFT 1994 Symposium on the Foundations of Software Engineering
, pp. 87-96
-
-
Evans, D.1
Guttag, J.2
Horning, J.3
Tan, Y.M.4
-
15
-
-
77956370543
-
-
in c
-
Howard, M.: Safe integer arithmetic in c (2006), http://blogs.msdn.com/ michaelhoward/ archive/2006/02/02/523392.aspx
-
(2006)
Safe integer arithmetic
-
-
Howard, M.1
-
16
-
-
85084164164
-
Cyclone: A safe dialect of c
-
Jim, T.,Morrisett, G., Grossman, D., Hicks, M., Cheney, J.,Wang, Y.: Cyclone: A safe dialect of c. In: Proceedings of the Annual Conference on USENIX Annual Technical Conference (2002)
-
(2002)
Proceedings of the Annual Conference on USENIX Annual Technical Conference
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
18
-
-
53349100043
-
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
-
Lin, Z., Zhang, X., Xu, D.: Convicting exploitable software vulnerabilities: An efficient input provenance based approach. In: Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-DCCS 2008 (2008)
-
(2008)
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-DCCS
-
-
Lin, Z.1
Zhang, X.2
Xu, D.3
-
19
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: Building customized program analysis tools with dynamic instrumentation. In: Programming Language Design and Implementation, pp. 190-200 (2005)
-
(2005)
Programming Language Design and Implementation
, pp. 190-200
-
-
Luk, C.K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
21
-
-
0036040304
-
Ccured: Type-safe retrofitting of legacy code
-
Necula, G.C., McPeak, S., Weimer, W.: Ccured: Type-safe retrofitting of legacy code. In: Proceedings of the Principles of Programming Languages, pp. 128-139 (2002)
-
(2002)
Proceedings of the Principles of Programming Languages
, pp. 128-139
-
-
Necula, G.C.1
McPeak, S.2
Weimer, W.3
-
24
-
-
81355161883
-
Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution
-
Wang, T., Wei, T., Lin, Z., Zou, W.: Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution. In: Proceedings of the 16th Annual Network and Distributed System Security Symposium, NDSS 2009 (2009)
-
(2009)
Proceedings of the 16th Annual Network and Distributed System Security Symposium, NDSS
-
-
Wang, T.1
Wei, T.2
Lin, Z.3
Zou, W.4
-
25
-
-
76549117792
-
Uqbtng: A tool capable of automatically finding integer overflows in win32 binaries
-
Wojtczuk, R.: Uqbtng: a tool capable of automatically finding integer overflows in win32 binaries. In: 22nd Chaos Communication Congress (2005)
-
(2005)
22nd Chaos Communication Congress
-
-
Wojtczuk, R.1
|