메뉴 건너뛰기




Volumn , Issue , 2012, Pages 133-143

Undangle: Early detection of dangling pointers in use-after-free and double-free vulnerabilities

Author keywords

Automated testing; binary analysis; debugging; dynamic analysis

Indexed keywords

AUTOMATED TESTING; BINARY ANALYSIS; DANGLING POINTERS; DETECTION TECHNIQUE; FIREFOX; FIREFOX WEB BROWSER; ROOT CAUSE; RUNTIME APPROACH; VULNERABILITY ANALYSIS;

EID: 84865306275     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/04000800.2336769     Document Type: Conference Paper
Times cited : (154)

References (53)
  • 1
    • 84865291817 scopus 로고    scopus 로고
    • October
    • Cve-2010-3962. October 2010. http://cve.mitre.org/cgibin/cvename.cgi? name=CVE-2010-3962.
    • (2010) Cve-2010-3962
  • 6
    • 33244470892 scopus 로고    scopus 로고
    • Improving Software Security with A C Pointer Analysis
    • May
    • D. Avots, M. Dalton, B. V. Livshits, and M. S. Lam. Improving Software Security With A C Pointer Analysis. ICSE, May 2005.
    • (2005) ICSE
    • Avots, D.1    Dalton, M.2    Livshits, B.V.3    Lam, M.S.4
  • 7
    • 78650616819 scopus 로고    scopus 로고
    • Dangling Pointer - Smashing the Pointer for Fun and Profit
    • July
    • J. Afek and A. Sharabani. Dangling Pointer - Smashing The Pointer For Fun And Profit. BlackHat USA, July 2007.
    • (2007) BlackHat USA
    • Afek, J.1    Sharabani, A.2
  • 8
    • 85076276275 scopus 로고    scopus 로고
    • Cling: A Memory Allocator to Mitigate Dangling Pointers
    • July
    • P. Akritidis. Cling: A Memory Allocator To Mitigate Dangling Pointers. USENIX Security, July 2010.
    • (2010) USENIX Security
    • Akritidis, P.1
  • 9
    • 0027963879 scopus 로고
    • Efficient Detection of All Pointer and Array Access Errors
    • June
    • T. M. Austin, S. E. Breach, and G. S. Sohi. Efficient Detection Of All Pointer And Array Access Errors. PLDI, June 1994.
    • (1994) PLDI
    • Austin, T.M.1    Breach, S.E.2    Sohi, G.S.3
  • 11
    • 84865290323 scopus 로고    scopus 로고
    • Diehard: Probabilistic Memory Safety for Unsafe Programming Languages
    • June
    • E. D. Berger and B. Zorn. Diehard: Probabilistic Memory Safety For Unsafe Programming Languages. PLDI, June 2006.
    • (2006) PLDI
    • Berger, E.D.1    Zorn, B.2
  • 12
    • 80053153597 scopus 로고    scopus 로고
    • Exe: A System for Automatically Generating Inputs of Death Using Symbolic Execution
    • Oct.
    • C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler. Exe: A System For Automatically Generating Inputs Of Death Using Symbolic Execution. CCS, Oct. 2006.
    • (2006) CCS
    • Cadar, C.1    Ganesh, V.2    Pawlowski, P.M.3    Dill, D.L.4    Engler, D.R.5
  • 16
    • 74049095923 scopus 로고    scopus 로고
    • Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-engineering
    • Nov.
    • J. Caballero, P. Poosankam, C. Kreibich, and D. Song. Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-engineering. CCS, Nov. 2009.
    • (2009) CCS
    • Caballero, J.1    Poosankam, P.2    Kreibich, C.3    Song, D.4
  • 17
    • 78650029404 scopus 로고    scopus 로고
    • Input Generation Via Decomposition and Re-stitching: Finding Bugs in Malware
    • Oct.
    • J. Caballero, P. Poosankam, S. McCamant, D. Babic, and D. Song. Input Generation Via Decomposition And Re-stitching: Finding Bugs In Malware. CCS, Oct. 2010.
    • (2010) CCS
    • Caballero, J.1    Poosankam, P.2    McCamant, S.3    Babic, D.4    Song, D.5
  • 18
    • 77952403312 scopus 로고    scopus 로고
    • Polyglot: Automatic Extraction of Protocol Message Format Using Dynamic Binary Analysis
    • Oct.
    • J. Caballero, H. Yin, Z. Liang, and D. Song. Polyglot: Automatic Extraction Of Protocol Message Format Using Dynamic Binary Analysis. CCS, Oct. 2007.
    • (2007) CCS
    • Caballero, J.1    Yin, H.2    Liang, Z.3    Song, D.4
  • 20
    • 33845580061 scopus 로고    scopus 로고
    • Efficiently Detecting All Dangling Pointer Uses in Production Servers
    • June
    • D. Dhurjati and V. Adve. Efficiently Detecting All Dangling Pointer Uses In Production Servers. DSN, June 2006.
    • (2006) DSN
    • Dhurjati, D.1    Adve, V.2
  • 21
    • 0242612097 scopus 로고    scopus 로고
    • Memory Safety Without Runtime Checks or Garbage Collection
    • June
    • D. Dhurjati, S. Kowshik, V. Adve, and C. Lattner. Memory Safety Without Runtime Checks Or Garbage Collection. LCTES, June 2003.
    • (2003) LCTES
    • Dhurjati, D.1    Kowshik, S.2    Adve, V.3    Lattner, C.4
  • 23
    • 85084164001 scopus 로고    scopus 로고
    • Flayer: Exposing Application Internals
    • Aug.
    • W. Drewry and T. Ormandy. Flayer: Exposing Application Internals. WOOT, Aug. 2007.
    • (2007) WOOT
    • Drewry, W.1    Ormandy, T.2
  • 27
    • 84865291820 scopus 로고    scopus 로고
    • Nov.
    • Google. Rewarding Web Application Security Research. Nov. 2010. http://googleonlinesecurity.blogspot.com/2010/11/rewarding-webapplication- security.html.
    • (2010) Rewarding Web Application Security Research
  • 28
    • 0000596666 scopus 로고
    • Purify: Fast Detection of Memory Leaks and Access Errors
    • R. Hastings and B. Joyce. Purify: Fast Detection Of Memory Leaks And Access Errors. USENIX Winter, 1992.
    • (1992) USENIX Winter
    • Hastings, R.1    Joyce, B.2
  • 31
    • 84865304840 scopus 로고    scopus 로고
    • Tie: Principled Reverse Engineering of Types in Binary Programs
    • Feb.
    • J. Lee, T. Avgerinos, and D. Brumley. Tie: Principled Reverse Engineering Of Types In Binary Programs. NDSS, Feb. 2011.
    • (2011) NDSS
    • Lee, J.1    Avgerinos, T.2    Brumley, D.3
  • 32
    • 84873352596 scopus 로고    scopus 로고
    • Automatic Reverse Engineering of Data Structures from Binary Execution
    • Feb.
    • Z. Lin, X. Zhang, and D. Xu. Automatic Reverse Engineering Of Data Structures From Binary Execution. NDSS, Feb. 2010.
    • (2010) NDSS
    • Lin, Z.1    Zhang, X.2    Xu, D.3
  • 33
    • 84893320590 scopus 로고    scopus 로고
    • Dynamic Test Generation to Find Integer Bugs in X86 Binary Linux Programs
    • Aug.
    • D. Molnar, X. C. Li, and D. A. Wagner. Dynamic Test Generation To Find Integer Bugs In X86 Binary Linux Programs. USENIX Security, Aug. 2009.
    • (2009) USENIX Security
    • Molnar, D.1    Li, X.C.2    Wagner, D.A.3
  • 34
    • 0025557712 scopus 로고
    • An Empirical Study of the Reliability of Unix Utilities
    • December
    • B. P. Miller, L. Fredriksen, and B. So. An Empirical Study Of The Reliability Of Unix Utilities. Communications of the ACM, 33, December 1990.
    • (1990) Communications of the ACM , vol.33
    • Miller, B.P.1    Fredriksen, L.2    So, B.3
  • 35
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
    • Feb.
    • J. Newsome and D. Song. Dynamic Taint Analysis For Automatic Detection, Analysis, And Signature Generation Of Exploits On Commodity Software. NDSS, Feb. 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 37
    • 0036040304 scopus 로고    scopus 로고
    • Ccured: Type-safe Retrofitting of Legacy Code
    • Jan.
    • G. C. Necula, S. McPeak, and W. Weimer. Ccured: Type-safe Retrofitting Of Legacy Code. POPL, Jan. 2002.
    • (2002) POPL
    • Necula, G.C.1    McPeak, S.2    Weimer, W.3
  • 40
    • 84865304839 scopus 로고    scopus 로고
    • Howard: A Dynamic Excavator for Reverse Engineering Data Structures
    • Feb.
    • A. Slowinska, T. Stancescu, and H. Bos. Howard: A Dynamic Excavator For Reverse Engineering Data Structures. NDSS, Feb. 2011.
    • (2011) NDSS
    • Slowinska, A.1    Stancescu, T.2    Bos, H.3
  • 42
    • 12844267418 scopus 로고    scopus 로고
    • Secure Program Execution Via Dynamic Information Flow Tracking
    • Oct.
    • G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure Program Execution Via Dynamic Information Flow Tracking. ASPLOS, Oct. 2004.
    • (2004) ASPLOS
    • Suh, G.E.1    Lee, J.W.2    Zhang, D.3    Devadas, S.4
  • 43
    • 20344383014 scopus 로고    scopus 로고
    • An Efficient and Backwards-compatible Transformation to Ensure Memory Safety of C Programs
    • Oct.
    • W. Xu, D. C. DuVarney, and R. Sekar. An Efficient And Backwards-compatible Transformation To Ensure Memory Safety Of C Programs. FSE, Oct. 2004.
    • (2004) FSE
    • Xu, W.1    DuVarney, D.C.2    Sekar, R.3
  • 49
    • 84865290901 scopus 로고    scopus 로고
    • July
    • Page Heap For Chromium. July 2011. http://www.chromium.org/developers/ testing/page-heap-for-chrome.
    • (2011)
  • 52
    • 84865291821 scopus 로고    scopus 로고
    • July
    • Valgrind. July 2011. http://valgrind.org/.
    • (2011)
  • 53
    • 84865304844 scopus 로고    scopus 로고
    • Xpcom.https://developer.mozilla.org/en/XPCOM
    • Mozilla Developer Network: Xpcom.https://developer.mozilla.org/en/XPCOM.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.