메뉴 건너뛰기




Volumn 63, Issue 2, 2012, Pages 469-480

Static program analysis assisted dynamic taint tracking for software vulnerability discovery

Author keywords

Code coverage; Data flow analysis; Software vulnerability; Taint analysis

Indexed keywords

CODE COVERAGE; DATA FLOW; MALICIOUS BEHAVIOR; RUNTIMES; SECURITY PROBLEMS; SOFTWARE VULNERABILITIES; SOFTWARE VULNERABILITY; STATIC PROGRAM ANALYSIS; TAINT ANALYSIS; TRACING TECHNIQUE;

EID: 84855442829     PISSN: 08981221     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.camwa.2011.08.001     Document Type: Conference Paper
Times cited : (19)

References (23)
  • 1
    • 84855426722 scopus 로고    scopus 로고
    • CWE
    • CWE. http://cwe.mitre.org/.
  • 11
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • NDSS
    • J. Newsome, D. Song, Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, in: Network and Distributed System Security Symposium, NDSS, 2005.
    • (2005) Network and Distributed System Security Symposium
    • Newsome, J.1    Song, D.2
  • 13
    • 81355161883 scopus 로고    scopus 로고
    • Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution
    • NDSS
    • T. Wang, T. Wei, Z. Lin, W. Zou, Intscope: automatically detecting integer overflow vulnerability in x86 binary using symbolic execution, in: Network and Distributed System Security Symposium, NDSS, 2009.
    • (2009) Network and Distributed System Security Symposium
    • Wang, T.1    Wei, T.2    Lin, Z.3    Zou, W.4
  • 17
    • 40449102639 scopus 로고    scopus 로고
    • Combining static and dynamic reasoning for bug detection
    • Y. Smaragdakis, C. Csallner, Combining static and dynamic reasoning for bug detection, in: TAP, 2007.
    • (2007) TAP
    • Smaragdakis, Y.1    Csallner, C.2
  • 21
    • 70450092967 scopus 로고    scopus 로고
    • Bouncer: Securing software by blocking bad input
    • DOI 10.1145/1294261.1294274, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
    • M. Costa, M. Castro, L. Zhou, L. Zhang, and M. Peinado Bouncer: securing software by blocking bad input Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles SOSP'07 2007 ACM New York, NY, USA 117 130 (Pubitemid 351429372)
    • (2007) Operating Systems Review (ACM) , pp. 117-130
    • Costa, M.1    Castro, M.2    Zhou, L.3    Zhang, L.4    Peinado, M.5
  • 23
    • 84855428374 scopus 로고    scopus 로고
    • CVE
    • CVE. http://cve.mitre.org/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.