-
3
-
-
85180528589
-
JPEG COM marker processing vulnerability in netscape browsers
-
July [Online]. Available
-
“JPEG COM marker processing vulnerability in netscape browsers,” Solar Designer, July 2000. [Online]. Available: http://www.openwall.com/advisories/OW-002-netscape-jpeg/
-
(2000)
Solar Designer
-
-
-
5
-
-
48649087397
-
-
CVE, Dec [Online]. Available
-
“Linux kernel do brk() vulnerablility,” CVE, Dec 2003. [Online]. Available: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0961
-
(2003)
Linux kernel do brk() vulnerablility
-
-
-
7
-
-
85180539307
-
Samba function reply nttrans vulnerability
-
Jul [Online]. Available
-
“Samba function reply nttrans vulnerability,” SecuriTeam, Jul 2003. [Online]. Available: http://www.securiteam.com/exploits/5TP0M2AAKS.html
-
(2003)
SecuriTeam
-
-
-
8
-
-
85180542412
-
Pine email header parsing vulnerability
-
Sep [Online]. Available
-
“Pine email header parsing vulnerability,” SecuriTeam, Sep 2003. [Online]. Available: http://www.securiteam.com/exploits/5DP0D1PB5Y.html
-
(2003)
SecuriTeam
-
-
-
11
-
-
85180542233
-
Putty 0.53b SFTP client packet parsing integer overflow vulnerability
-
Feb [Online]. Available
-
“Putty 0.53b SFTP client packet parsing integer overflow vulnerability,” SecurityFocus, Feb 2005. [Online]. Available: http://www.securityfocus.com/bid/12601/
-
(2005)
SecurityFocus
-
-
-
12
-
-
85180539444
-
Samba directory access control list remote integer overflow vulnerability
-
SecurityFocus, Dec [Online]. Available
-
“Samba directory access control list remote integer overflow vulnerability,” SecurityFocus, Dec 2004. [Online]. Available: http://www.securityfocus.com/bid/11973
-
(2004)
-
-
-
13
-
-
85180530569
-
Mailutil-0.6 imap4d remote integer overflow vulnerability
-
SecurityFocus, May [Online]. Available
-
“Mailutil-0.6 imap4d remote integer overflow vulnerability,” SecurityFocus, May 2005. [Online]. Available: http://www.securityfocus.com/bid/13763/
-
(2005)
-
-
-
14
-
-
85180535660
-
-
iDEFENSE lab, Dec [Online]. Available
-
“libtiff STRIPOFFSETS integer overflow vulnerability,” iDEFENSE lab, Dec 2004. [Online]. Available: http://www.idefense.com/intelligence/vulnerabilities/display.php?id=173
-
(2004)
libtiff STRIPOFFSETS integer overflow vulnerability
-
-
-
20
-
-
85180535835
-
-
CVE. [Online]. Available
-
“CVE (version 20040901),” CVE. [Online]. Available: http://www.cve.mitre.org/cgi-bin/cvekey.cgi?keyword=integer
-
CVE (version 20040901)
-
-
-
21
-
-
85084160243
-
Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks
-
etc., in
-
C. Cowan, C. Pu, D. Maier, and etc., “Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks,” in USENIX Security Symposium, 1998, p. 63C77.
-
(1998)
USENIX Security Symposium
, pp. 63C77
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
-
22
-
-
1442288707
-
Ccured in the real world
-
etc., in June
-
J. Condit, M. Harren, S. McPeak, and etc., “Ccured in the real world,” in Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation, June 2003.
-
(2003)
Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation
-
-
Condit, J.1
Harren, M.2
McPeak, S.3
-
23
-
-
79959302314
-
-
Carnegie Mellon University, Tech. Rep. CMU-CS-06-136, Mar
-
D. Brumley, D. Song, and J. Slember, “Towards automatically eliminating integer-based vulnerabilities,” Carnegie Mellon University, Tech. Rep. CMU-CS-06-136, Mar 2006.
-
(2006)
Towards automatically eliminating integer-based vulnerabilities
-
-
Brumley, D.1
Song, D.2
Slember, J.3
-
24
-
-
84959039613
-
CIL: Intermediate language and tools for analysis and transformation of C
-
G. Necula, S. McPeak, S. Rahul, and W. Weimer, “CIL: Intermediate language and tools for analysis and transformation of C,” in Proc. Conference on Compiler Construction, 2002.
-
(2002)
Proc. Conference on Compiler Construction
-
-
Necula, G.1
McPeak, S.2
Rahul, S.3
Weimer, W.4
-
25
-
-
85180543051
-
-
G. Necula, S. McPeak, S. Rahul, and W. Weimer, “CIL version 1.3.3,” http://manju.cs.berkeley.edu/cil/, 2005.
-
(2005)
CIL version 1.3.3
-
-
Necula, G.1
McPeak, S.2
Rahul, S.3
Weimer, W.4
-
27
-
-
70349885896
-
-
Phrack Inc., Dec [Online]. Available
-
O. Horovitz, “Big loop integer protection,” Phrack Inc., Dec 2002. [Online]. Available: http://www.phrack.org/phrack/60/p60-0x09.txt
-
(2002)
Big loop integer protection
-
-
Horovitz, O.1
-
28
-
-
33144459697
-
-
Jan [Online]. Available
-
D. LeBlanc, “Integer handling with the C++ SafeInt class,” Jan 2004. [Online]. Available: http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dncode/html/secure01142004.asp
-
(2004)
Integer handling with the C++ SafeInt class
-
-
LeBlanc, D.1
-
30
-
-
77956370543
-
-
Feb [Online]. Available
-
M. Howard et al., “Safe integer arithmetic in C,” Feb 2006. [Online]. Available: http://blogs.msdn.com/ michael howard/archive/2006/02/02/523392.aspx
-
(2006)
Safe integer arithmetic in C
-
-
Howard, M.1
-
34
-
-
85084164164
-
Cyclone: A safe dialect of c
-
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang, “Cyclone: A safe dialect of c,” in USENIX Annual Technical Conference, 2002.
-
(2002)
USENIX Annual Technical Conference
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
35
-
-
35048861896
-
A tool for checking ANSI-C programs
-
K. Jensen and A. Podelski, Eds., Springer
-
E. Clarke, D. Kroening, and F. Lerda, “A tool for checking ANSI-C programs,” in Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2004), ser. Lecture Notes in Computer Science, K. Jensen and A. Podelski, Eds., vol. 2988. Springer, 2004, pp. 168–176.
-
(2004)
Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2004), ser. Lecture Notes in Computer Science
, vol.2988
, pp. 168-176
-
-
Clarke, E.1
Kroening, D.2
Lerda, F.3
-
37
-
-
11244321232
-
CMC: A prgramatic approach to model checking real code
-
M. Musuvathi, D. Park, A. Chou, D. Engler, and D. Dill, “CMC: A prgramatic approach to model checking real code,” in Proceedings of the 5th symposium on operating systems design and implementation, 2002.
-
(2002)
Proceedings of the 5th symposium on operating systems design and implementation
-
-
Musuvathi, M.1
Park, D.2
Chou, A.3
Engler, D.4
Dill, D.5
-
38
-
-
18844368270
-
Automatic predicate abstraction of C programs
-
T. Ball, R. Majumdar, T. Millstein, and S. K. Rajamani, “Automatic predicate abstraction of C programs,” in Programming Language Design and Implementation (PLDI), 2001.
-
(2001)
Programming Language Design and Implementation (PLDI)
-
-
Ball, T.1
Majumdar, R.2
Millstein, T.3
Rajamani, S. K.4
-
39
-
-
84885663355
-
-
P. Cousot, R. Cousot, J. Feret, L. Mauborgne, A. Mine, D. Monniaux, and X. Rival, “The ASTREE static analyzer,” http://www.astree.ens.fr/.
-
The ASTREE static analyzer
-
-
Cousot, P.1
Cousot, R.2
Feret, J.3
Mauborgne, L.4
Mine, A.5
Monniaux, D.6
Rival, X.7
-
40
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
D. Engler, D. Chen, S. Hallem, A. Chou, and B. Chelf, “Bugs as deviant behavior: A general approach to inferring errors in systems code,” in Symposium on Operating System Principles, 2001.
-
(2001)
Symposium on Operating System Principles
-
-
Engler, D.1
Chen, D.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
42
-
-
0004072686
-
-
Addison-Wesley Publishing Company
-
A. Aho, R. Sethi, and J. Ullman, Compilers: Principles, Techniques, and Tools. Addison-Wesley Publishing Company, 1986.
-
(1986)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.1
Sethi, R.2
Ullman, J.3
-
48
-
-
14844302134
-
MECA: an extensible, expressive system and language for statically checking security properties
-
ACM Press
-
J. Yang, T. Kremenek, Y. Xie, and D. Engler, “MECA: an extensible, expressive system and language for statically checking security properties,” in Proceedings of the 10th ACM conference on Computer and communication security. ACM Press, 2003, pp. 321–334.
-
(2003)
Proceedings of the 10th ACM conference on Computer and communication security
, pp. 321-334
-
-
Yang, J.1
Kremenek, T.2
Xie, Y.3
Engler, D.4
|