메뉴 건너뛰기




Volumn , Issue , 2012, Pages 359-368

Generalized vulnerability extrapolation using abstract syntax trees

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACT SYNTAX TREES; MANUAL ANALYSIS; OPEN SOURCE PROJECTS; SECURITY FLAWS; SOURCE CODES; STRUCTURAL PATTERN;

EID: 84872116710     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2420950.2421003     Document Type: Conference Paper
Times cited : (234)

References (33)
  • 6
    • 0036041420 scopus 로고    scopus 로고
    • Bugs as deviant behavior: A general approach to inferring errors in systems code
    • DOI 10.1145/502059.502041
    • D. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf. Bugs as deviant behavior: A general approach to inferring errors in systems code. In Proc. of ACM Symposium on Operating Systems Principles (SOSP), pages 57-72, 2001. (Pubitemid 33612605)
    • (2001) Operating Systems Review (ACM) , vol.35 , Issue.5 , pp. 57-72
    • Engler, D.1    Chen, D.Y.2    Hallem, S.3    Chou, A.4    Chelf, B.5
  • 9
    • 79957624835 scopus 로고    scopus 로고
    • Vulnerability detection systems: Think cyborg, not robot
    • S. Heelan. Vulnerability detection systems: Think cyborg, not robot. IEEE Security & Privacy, 9(3):74-77, 2011.
    • (2011) IEEE Security & Privacy , vol.9 , Issue.3 , pp. 74-77
    • Heelan, S.1
  • 13
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A multilinguistic token-based code clone detection system for large scale source code
    • T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering, pages 654-670, 2002.
    • (2002) IEEE Transactions on Software Engineering , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 16
    • 33645819206 scopus 로고    scopus 로고
    • Cp-miner: Finding copy-paste and related bugs in large-scale software code
    • Z. Li, S. Lu, S. Myagmar, and Y. Zhou. Cp-miner: Finding copy-paste and related bugs in large-scale software code. IEEE Transactions on Software Engineering, 32:176-192, 2006.
    • (2006) IEEE Transactions on Software Engineering , vol.32 , pp. 176-192
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 18
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in java applications with static analysis
    • V. B. Livshits and M. S. Lam. Finding security vulnerabilities in java applications with static analysis. In Proc. of USENIX Security Symposium, 2005.
    • (2005) Proc. of USENIX Security Symposium
    • Livshits, V.B.1    Lam, M.S.2
  • 22
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. of Network and Distributed System Security Symposium (NDSS), 2005.
    • (2005) Proc. of Network and Distributed System Security Symposium (NDSS)
    • Newsome, J.1    Song, D.2
  • 23
    • 0029345191 scopus 로고
    • ANTLR: A predicated-LL(k) parser generator
    • T. Parr and R. Quong. ANTLR: A predicated-LL(k) parser generator. Software Practice and Experience, 25: 789-810, 1995.
    • (1995) Software Practice and Experience , vol.25 , pp. 789-810
    • Parr, T.1    Quong, R.2
  • 24
    • 84872112733 scopus 로고    scopus 로고
    • visited April, 2012
    • rats. Rough auditing tool for security. Fortify Software Inc., https://www.fortify.com/ssa-elements/threat-intelligence/rats.html, visited April, 2012.
    • Rats. Rough Auditing Tool for Security
  • 30
    • 84872107422 scopus 로고    scopus 로고
    • visited April, 2012
    • D. A. Wheeler. Flawfinder. http://www.dwheeler.com/flawfinder/, visited April, 2012.
    • Flawfinder
    • Wheeler, D.A.1
  • 31
    • 24344496977 scopus 로고    scopus 로고
    • Automatic mining of source code repositories to improve bug finding techniques
    • DOI 10.1109/TSE.2005.63
    • C. C. Williams and J. K. Hollingsworth. Automatic mining of source code repositories to improve bug finding techniques. IEEE Transactions on Software Engineering, 31:466-480, 2005. (Pubitemid 41245069)
    • (2005) IEEE Transactions on Software Engineering , vol.31 , Issue.6 , pp. 466-480
    • Williams, C.C.1    Hollingsworth, J.K.2
  • 32
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In Proc. of USENIX Security Symposium, 2006.
    • (2006) Proc. of USENIX Security Symposium
    • Xie, Y.1    Aiken, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.