메뉴 건너뛰기




Volumn , Issue , 2010, Pages 37-47

Automatically identifying critical input regions and code in applications

Author keywords

Critical code; Critical input; Forgiving code; Forgiving input

Indexed keywords

COMPLEX INPUTS; CRITICAL CODES; CRITICAL INPUTS; CRITICAL REGION; DYNAMIC EXECUTION; EXPERIMENTAL EVALUATION; FORGIVING CODE; FORGIVING INPUT; INPUT FIELD;

EID: 77955883088     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1831708.1831713     Document Type: Conference Paper
Times cited : (52)

References (28)
  • 1
    • 33645597073 scopus 로고    scopus 로고
    • The advantages of block-based protocol analysis for security testing
    • Immunity, Inc.
    • Dave Aitel. The advantages of block-based protocol analysis for security testing. Technical report, Immunity, Inc., 2002.
    • (2002) Technical Report
    • Aitel, D.1
  • 2
    • 77952403312 scopus 로고    scopus 로고
    • Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
    • Juan Caballero, Heng Yin, Zhenkai Liang, and Dawn Xiaodong Song. Polyglot: automatic extraction of protocol message format using dynamic binary analysis. In CCS, pages 317-329, 2007.
    • (2007) CCS , pp. 317-329
    • Caballero, J.1    Yin, H.2    Liang, Z.3    Song, D.X.4
  • 3
    • 35449005800 scopus 로고    scopus 로고
    • Shredding your garbage: Reducing data lifetime through secure deallocation
    • Jim Chow, Ben Pfaff, Tal Garfinkel, and Mendel Rosenblum. Shredding your garbage: reducing data lifetime through secure deallocation. In Security, pages 22-22, 2005.
    • (2005) Security , pp. 22-22
    • Chow, J.1    Pfaff, B.2    Garfinkel, T.3    Rosenblum, M.4
  • 4
    • 34548212308 scopus 로고    scopus 로고
    • Dytan: A generic dynamic taint analysis framework
    • James Clause, Wanchun Li, and Ro Orso. Dytan: A generic dynamic taint analysis framework. In ISSTA, pages 196-206, 2007.
    • (2007) ISSTA , pp. 196-206
    • Clause, J.1    Li, W.2    Orso, R.3
  • 5
    • 85008249099 scopus 로고    scopus 로고
    • Penumbra: Automatically identifying failure-relevant inputs using dynamic tainting
    • James A. Clause and Alessandro Orso. Penumbra: automatically identifying failure-relevant inputs using dynamic tainting. In ISSTA, pages 249-260, 2009.
    • (2009) ISSTA , pp. 249-260
    • Clause, J.A.1    Orso, A.2
  • 7
    • 70349283250 scopus 로고    scopus 로고
    • Tupni: Automatic reverse engineering of input formats
    • Weidong Cui, Marcus Peinado, Karl Chen, Helen J. Wang, and Luis Irún-Briz. Tupni: automatic reverse engineering of input formats. In CCS, 2008.
    • (2008) CCS
    • Cui, W.1    Peinado, M.2    Chen, K.3    Wang, H.J.4    Irún-Briz, L.5
  • 8
    • 85084164001 scopus 로고    scopus 로고
    • Flayer: Exposing application internals
    • Will Drewry and Tavis Ormandy. Flayer: exposing application internals. In WOOT, pages 1-9, 2007.
    • (2007) WOOT , pp. 1-9
    • Drewry, W.1    Ormandy, T.2
  • 9
    • 77949898398 scopus 로고    scopus 로고
    • Taint-based directed whitebox fuzzing
    • Vijay Ganesh, Tim Leek, and Martin Rinard. Taint-based directed whitebox fuzzing. In ICSE, 2009.
    • (2009) ICSE
    • Ganesh, V.1    Leek, T.2    Rinard, M.3
  • 11
    • 3042658703 scopus 로고    scopus 로고
    • LLVM: A compilation framework for lifelong program analysis & transformation
    • Chris Lattner and Vikram S. Adve. LLVM: A compilation framework for lifelong program analysis & transformation. In CGO, pages 75-88, 2004.
    • (2004) CGO , pp. 75-88
    • Lattner, C.1    Adve, V.S.2
  • 12
    • 74049090626 scopus 로고    scopus 로고
    • Automatic protocol format reverse engineering through context-aware monitored execution
    • Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, and Xiangyu Zhang. Automatic protocol format reverse engineering through context-aware monitored execution. In NDSS, 2008.
    • (2008) NDSS
    • Lin, Z.1    Jiang, X.2    Xu, D.3    Zhang, X.4
  • 13
    • 0025557712 scopus 로고
    • An empirical study of the reliability of unix utilities
    • Barton P. Miller, Louis Fredriksen, and Bryan So. An empirical study of the reliability of unix utilities. CACM, 33(12):32-44, 1990.
    • (1990) CACM , vol.33 , Issue.12 , pp. 32-44
    • Miller, B.P.1    Fredriksen, L.2    So, B.3
  • 16
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • James Newsome and Dawn Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In NDSS, 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 17
    • 42149128799 scopus 로고    scopus 로고
    • Detecting and eliminating memory leaks using cyclic memory allocation
    • Huu Hai Nguyen and Martin C. Rinard. Detecting and eliminating memory leaks using cyclic memory allocation. In ISMM, pages 15-30, 2007.
    • (2007) ISMM , pp. 15-30
    • Nguyen, H.H.1    Rinard, M.C.2
  • 18
    • 34548785574 scopus 로고    scopus 로고
    • Feedback-directed random test generation
    • Carlos Pacheco, Shuvendu K. Lahiri, Michael D. Ernst, and Thomas Ball. Feedback-directed random test generation. In ICSE, pages 75-84, 2007.
    • (2007) ICSE , pp. 75-84
    • Pacheco, C.1    Lahiri, S.K.2    Ernst, M.D.3    Ball, T.4
  • 19
    • 77952162164 scopus 로고    scopus 로고
    • Samurai: Protecting critical data in unsafe languages
    • Karthik Pattabiraman, Vinod Grover, and Benjamin G. Zorn. Samurai: protecting critical data in unsafe languages. In EuroSys, pages 219-232, 2008.
    • (2008) EuroSys , pp. 219-232
    • Pattabiraman, K.1    Grover, V.2    Zorn, B.G.3
  • 21
    • 40349087553 scopus 로고    scopus 로고
    • Lift: A low-overhead practical information flow tracking system for detecting security attacks
    • Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yuanyuan Zhou, and Youfeng Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In MICRO, pages 135-148, 2006.
    • (2006) MICRO , pp. 135-148
    • Qin, F.1    Wang, C.2    Li, Z.3    Kim, H.-S.4    Zhou, Y.5    Wu, Y.6
  • 22
    • 34547435244 scopus 로고    scopus 로고
    • Probabilistic accuracy bounds for fault-tolerant computations that discard tasks
    • Martin C. Rinard. Probabilistic accuracy bounds for fault-tolerant computations that discard tasks. In ICS, pages 324-334, 2006.
    • (2006) ICS , pp. 324-334
    • Rinard, M.C.1
  • 23
    • 42149154819 scopus 로고    scopus 로고
    • Living in the comfort zone
    • Martin C. Rinard. Living in the comfort zone. In OOPSLA, pages 611-622, 2007.
    • (2007) OOPSLA , pp. 611-622
    • Rinard, M.C.1
  • 24
    • 42149175943 scopus 로고    scopus 로고
    • Using early phase termination to eliminate load imbalances at barrier synchronization points
    • Martin C. Rinard. Using early phase termination to eliminate load imbalances at barrier synchronization points. In OOPSLA, pages 369-386, 2007.
    • (2007) OOPSLA , pp. 369-386
    • Rinard, M.C.1
  • 25
    • 84906487819 scopus 로고    scopus 로고
    • Enhancing server availability and security through failure-oblivious computing
    • Martin C. Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu, and William S. Beebee. Enhancing server availability and security through failure-oblivious computing. In OSDI, pages 303-316, 2004.
    • (2004) OSDI , pp. 303-316
    • Rinard, M.C.1    Cadar, C.2    Dumitran, D.3    Roy, D.M.4    Leu, T.5    Beebee, W.S.6
  • 26
    • 85139558538 scopus 로고    scopus 로고
    • Exploring the acceptability envelope
    • Martin C. Rinard, Cristian Cadar, and Huu Hai Nguyen. Exploring the acceptability envelope. In OOPSLA Companion, pages 21-30, 2005.
    • (2005) OOPSLA Companion , pp. 21-30
    • Rinard, M.C.1    Cadar, C.2    Nguyen, H.H.3
  • 27
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • G. Edward Suh, Jae W. Lee, David Zhang, and Srinivas Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS, pages 85-96, 2004.
    • (2004) ASPLOS , pp. 85-96
    • Edward Suh, G.1    Lee, J.W.2    Zhang, D.3    Devadas, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.