메뉴 건너뛰기




Volumn , Issue , 2010, Pages 91-100

As-if infinitely ranged integer model

Author keywords

Empirical study; Programming languages; Software security

Indexed keywords

CONSTRAINT VIOLATION; DEPLOYED SYSTEMS; EMPIRICAL STUDIES; FALSE NEGATIVE RATE; FALSE POSITIVE; FUZZ TESTING; INTEGER OVERFLOW; PROGRAMMING LANGUAGE; RUNTIME OVERHEADS; RUNTIMES; SOFTWARE SECURITY; SOURCE CODES; TYPICAL APPLICATION;

EID: 79952022137     PISSN: 10719458     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISSRE.2010.29     Document Type: Conference Paper
Times cited : (23)

References (14)
  • 1
    • 12344279827 scopus 로고    scopus 로고
    • Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security?
    • (January 05 - 08, 2004). HICSS. IEEE Computer Society, Washington, DC
    • Heffley, J. and Meunier, P. 2004. "Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security?" Proc. 37th Annual Hawaii international Conference on System Sciences (HICSS'04) - Track 9 - Volume 9 (January 05 - 08, 2004). HICSS. IEEE Computer Society, Washington, DC, 90277.
    • (2004) Proc. 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9 , vol.9 , pp. 90277
    • Heffley, J.1    Meunier, P.2
  • 6
    • 0004026606 scopus 로고    scopus 로고
    • Paris, France: European Space Agency (ESA) & National Center for Space Study (CNES) Inquiry Board, July
    • Lions, J. L. ARIANE 5 Flight 501 Failure Report. Paris, France: European Space Agency (ESA) & National Center for Space Study (CNES) Inquiry Board, July 1996.
    • (1996) ARIANE 5 Flight 501 Failure Report
    • Lions, J.L.1
  • 7
    • 0344859490 scopus 로고    scopus 로고
    • (Version 1.900.0). December
    • Michael D. Adams. JasPer Software Reference Manual (Version 1.900.0). December 2006. http://www.ece.uvic.ca/~mdadams/jasper/jasper.pdf
    • (2006) JasPer Software Reference Manual
    • Adams, M.D.1
  • 8
    • 79952020076 scopus 로고    scopus 로고
    • RICH: Automatically Protecting Against Integer-Based Vulnerabilities
    • Reston, VA: ISOC
    • Brumley, David; Chiueh, Tzi-cker; Johnson, Robert; Lin, Huijia; and Song, Dawn. "RICH: Automatically Protecting Against Integer-Based Vulnerabilities." Proc. NDSS, San Diego, CA, Feb. 2007. Reston, VA: ISOC, 2007. http://www.cs.berkeley.edu/~dawnsong/papers/efficient-detection-integer- based-attacks.pdf
    • Proc. NDSS, San Diego, CA, Feb. 2007 , vol.2007
    • Brumley, D.1    Chiueh, T.-C.2    Johnson, R.3    Lin, H.4    Song, D.5
  • 10
    • 79952029195 scopus 로고    scopus 로고
    • Washington, D.C.: International Committee for Information Technology Standards
    • Hedquist, Barry. ISO/JTC1/SC22/WG14 AND INCITS PL22.11 MARCH/APRIL MEETING. MINUTES). Washington, D.C.: International Committee for Information Technology Standards, 2009. http://www.open-std.org/jtc1/sc22/wg14/www/docs/ n1421.pdf
    • (2009) ISO/JTC1/SC22/WG14 and INCITS PL22.11 March/april Meeting. Minutes
    • Hedquist, B.1
  • 11
    • 79952034001 scopus 로고    scopus 로고
    • International Standards Organization. ISO/IEC TR 24731. Geneva, Switzerland: International Standards Organization, April
    • International Standards Organization. ISO/IEC TR 24731. Extensions to the C Library, - Part I: Bounds-checking interfaces. Geneva, Switzerland: International Standards Organization, April 2006.
    • (2006) Extensions to the C Library, - Part I: Bounds-checking Interfaces


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.