메뉴 건너뛰기




Volumn , Issue , 2011, Pages 166-176

Path- and index-sensitive string analysis based on monadic second-order logic

Author keywords

static program analysis; string analysis; web security

Indexed keywords

MONADIC SECOND-ORDER LOGIC; NOVEL TECHNIQUES; PROGRAM VARIABLES; SECURITY ANALYSIS; STATIC PROGRAM ANALYSIS; STRING ANALYSIS; THEOREM PROVERS; WEB APPLICATION; WEB SECURITY;

EID: 80051944491     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2001420.2001441     Document Type: Conference Paper
Times cited : (22)

References (37)
  • 1
    • 84872431733 scopus 로고    scopus 로고
    • Source Edition. ibm.com/software/r ational/products/appscan/source
    • IBM Rational AppScan Source Edition. ibm.com/software/r ational/products/appscan/source.
    • IBM Rational AppScan
  • 3
    • 26844495240 scopus 로고    scopus 로고
    • Bounded model construction for monadic second-order logics
    • A. Ayari and D. Basin. Bounded model construction for monadic second-order logics. In CAV, 2000.
    • (2000) CAV
    • Ayari, A.1    Basin, D.2
  • 5
    • 76749161248 scopus 로고    scopus 로고
    • Path feasibility analysis for string-manipulating programs
    • N. Bjørner, N. Tillmann, and A. Voronkov. Path feasibility analysis for string-manipulating programs. In TACAS, 2009.
    • (2009) TACAS
    • Bjørner, N.1    Tillmann, N.2    Voronkov, A.3
  • 6
    • 35048885595 scopus 로고    scopus 로고
    • Creating vulnerability signatures using weakest preconditions
    • D. Brumley, H. Wang, S. Jha, and D. Song. Creating vulnerability signatures using weakest preconditions. In CSF, 2007.
    • (2007) CSF
    • Brumley, D.1    Wang, H.2    Jha, S.3    Song, D.4
  • 9
    • 0029180092 scopus 로고
    • Formal language, grammar and set-constraint-based program analysis by abstract interpretation
    • P. Cousot and R. Cousot. Formal language, grammar and set-constraint-based program analysis by abstract interpretation. In FPCA, 1995.
    • (1995) FPCA
    • Cousot, P.1    Cousot, R.2
  • 10
    • 0026243790 scopus 로고
    • Efficiently computing static single assignment form and the control dependence graph
    • R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck. Efficiently computing static single assignment form and the control dependence graph. TOPLAS, 1991.
    • (1991) TOPLAS
    • Cytron, R.1    Ferrante, J.2    Rosen, B.K.3    Wegman, M.N.4    Zadeck, F.K.5
  • 11
    • 79952423152 scopus 로고    scopus 로고
    • A string constraint solver for detecting web application vulnerability
    • X. Fu and C.-C. Li. A string constraint solver for detecting web application vulnerability. In SEKE, 2010.
    • (2010) SEKE
    • Fu, X.1    Li, C.-C.2
  • 12
    • 77949898213 scopus 로고    scopus 로고
    • Modular string-sensitive permission analysis with demand-driven precision
    • E. Geay, M. Pistoia, T. Tateishi, B. Ryder, and J. Dolby. Modular string-sensitive permission analysis with demand-driven precision. In ICSE, 2009.
    • (2009) ICSE
    • Geay, E.1    Pistoia, M.2    Tateishi, T.3    Ryder, B.4    Dolby, J.5
  • 13
    • 0011792814 scopus 로고    scopus 로고
    • A Framework for Call Graph Construction Algorithms
    • D. Grove and C. Chambers. A Framework for Call Graph Construction Algorithms. TOPLSA, 2001.
    • (2001) TOPLSA
    • Grove, D.1    Chambers, C.2
  • 14
    • 0031245885 scopus 로고    scopus 로고
    • Call graph construction in object-oriented languages
    • D. Grove, G. DeFouw, J. Dean, and C. Chambers. Call graph construction in object-oriented languages. In OOPSLA, 1997.
    • (1997) OOPSLA
    • Grove, D.1    DeFouw, G.2    Dean, J.3    Chambers, C.4
  • 17
    • 70450267483 scopus 로고    scopus 로고
    • A decision procedure for subset constraints over regular languages
    • P. Hooimeijer and W. Weimer. A decision procedure for subset constraints over regular languages. In PLDI, 2009.
    • (2009) PLDI
    • Hooimeijer, P.1    Weimer, W.2
  • 18
    • 84886511832 scopus 로고
    • Regular models of phonological rule systems
    • M. Kay and R. M. Kaplan. Regular models of phonological rule systems. Computational Linguistics, 20(3), 1994.
    • (1994) Computational Linguistics , vol.20 , Issue.3
    • Kay, M.1    Kaplan, R.M.2
  • 21
    • 70450245243 scopus 로고    scopus 로고
    • Merline: Specification inference for explicit information flow problems
    • B. Livshits, A. V. Nori, S. K. Rajamani, and A. Banerjee. Merline: Specification inference for explicit information flow problems. In PLDI, 2009.
    • (2009) PLDI
    • Livshits, B.1    Nori, A.V.2    Rajamani, S.K.3    Banerjee, A.4
  • 22
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in java applications with static analysis
    • V. B. Livshits and M. S. Lam. Finding security vulnerabilities in java applications with static analysis. In USENIX Security, 2005.
    • (2005) USENIX Security
    • Livshits, V.B.1    Lam, M.S.2
  • 23
    • 33749823368 scopus 로고    scopus 로고
    • Static approximation of dynamically generated web pages
    • Y. Minamide. Static approximation of dynamically generated web pages. In WWW, 2005.
    • (2005) WWW
    • Minamide, Y.1
  • 24
    • 84987216779 scopus 로고
    • Global value numbers and redundant computations
    • B. K. Rosen, M. N. Wegman, and F. K. Zadeck. Global value numbers and redundant computations. In POPL, 1988.
    • (1988) POPL
    • Rosen, B.K.1    Wegman, M.N.2    Zadeck, F.K.3
  • 26
    • 84990868632 scopus 로고    scopus 로고
    • Efficient symbolic execution of strings for validating web applications
    • D. Shannon, I. Ghosh, S. Rajan, and S. Khurshid. Efficient symbolic execution of strings for validating web applications. In DEFECTS, 2009.
    • (2009) DEFECTS
    • Shannon, D.1    Ghosh, I.2    Rajan, S.3    Khurshid, S.4
  • 27
    • 0005301935 scopus 로고    scopus 로고
    • Combining slicing and constraint solving for validation of measurement software
    • G. Snelting. Combining slicing and constraint solving for validation of measurement software. In SAS, 1996.
    • (1996) SAS
    • Snelting, G.1
  • 28
    • 80051948665 scopus 로고    scopus 로고
    • Path- and index-sensitive string analysis based on monadic second-order logic
    • T. Tateishi, M. Pistoia, and O. Tripp. Path- and index-sensitive string analysis based on monadic second-order logic. IBM Research Report RT0930, 2011.
    • (2011) IBM Research Report RT0930
    • Tateishi, T.1    Pistoia, M.2    Tripp, O.3
  • 29
    • 70349698143 scopus 로고    scopus 로고
    • Pex: White box test generation for.NET
    • N. Tillmann and J. D. Halleux. Pex: white box test generation for .NET. In TAP, 2008.
    • (2008) TAP
    • Tillmann, N.1    Halleux, J.D.2
  • 32
    • 80051918227 scopus 로고    scopus 로고
    • T. J. Watson Libraries for Analysis, wala.sf.net
    • T. J. Watson Libraries for Analysis, wala.sf.net/.
  • 33
    • 35449004893 scopus 로고    scopus 로고
    • Sound and precise analysis of web applications for injection vulnerabilities
    • G. Wassermann and Z. Su. Sound and precise analysis of web applications for injection vulnerabilities. In PLDI, 2007.
    • (2007) PLDI
    • Wassermann, G.1    Su, Z.2
  • 34
    • 84976709672 scopus 로고
    • Constant propagation with conditional branches
    • M. N. Wegman and F. K. Zadeck. Constant propagation with conditional branches. TOPLAS, 1991.
    • (1991) TOPLAS
    • Wegman, M.N.1    Zadeck, F.K.2
  • 35
    • 77952112519 scopus 로고    scopus 로고
    • Generating vulnerability signatures for string manipulating programs using automata-based forward and backward symbolic analyses
    • F. Yu, M. Alkhalaf, and T. Bultan. Generating vulnerability signatures for string manipulating programs using automata-based forward and backward symbolic analyses. In ASE, 2009.
    • (2009) ASE
    • Yu, F.1    Alkhalaf, M.2    Bultan, T.3
  • 37
    • 80051920443 scopus 로고    scopus 로고
    • Z3, research.microsoft.com/projects/z3
    • Z3, research.microsoft.com/projects/z3.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.