메뉴 건너뛰기




Volumn , Issue , 2013, Pages 499-510

Chucky: Exposing missing checks in source code for vulnerability discovery

Author keywords

anomaly detection; static analysis; vulnerabilities

Indexed keywords

ANOMALY DETECTION; EMPIRICAL EVALUATIONS; INPUT VALIDATION; OPEN SOURCE PROJECTS; SECURITY VULNERABILITIES; SECURITY-CRITICAL; VULNERABILITIES; VULNERABILITY DISCOVERY;

EID: 84888990646     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2508859.2516665     Document Type: Conference Paper
Times cited : (188)

References (43)
  • 2
    • 0031191630 scopus 로고    scopus 로고
    • The use of the area under the ROC curve in the evaluation of machine learning algorithms
    • A. Bradley. The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognition, 30(7):1145-1159, 1997..
    • (1997) Pattern Recognition , vol.30 , Issue.7 , pp. 1145-1159
    • Bradley, A.1
  • 7
    • 0036147522 scopus 로고    scopus 로고
    • Improving security using extensible lightweight static analysis
    • D. Evans and D. Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, 19(1):42-51, 2002..
    • (2002) IEEE Software , vol.19 , Issue.1 , pp. 42-51
    • Evans, D.1    Larochelle, D.2
  • 11
    • 79957624835 scopus 로고    scopus 로고
    • Vulnerability detection systems: Think cyborg, not robot
    • S. Heelan. Vulnerability detection systems: Think cyborg, not robot. IEEE Security & Privacy, 9(3):74-77, 2011..
    • (2011) IEEE Security & Privacy , vol.9 , Issue.3 , pp. 74-77
    • Heelan, S.1
  • 16
    • 32344452883 scopus 로고    scopus 로고
    • PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code
    • Z. Li and Y. Zhou. PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. In Proc. of European Software Engineering Conference (ESEC), pages 306-315, 2005..
    • (2005) Proc. of European Software Engineering Conference (ESEC) , pp. 306-315
    • Li, Z.1    Zhou, Y.2
  • 21
    • 84889045587 scopus 로고    scopus 로고
    • Security flaws in universal plug and play: Unplug. Don't play
    • Technical report
    • H. Moore. Security flaws in universal plug and play: Unplug. don't play. Technical report, Rapid 7, 2013..
    • (2013) Rapid , vol.7
    • Moore, H.1
  • 24
    • 84888991287 scopus 로고    scopus 로고
    • Recent Java exploitation trends and malware
    • Presentation at
    • J. W. Oh. Recent Java exploitation trends and malware. Presentation at Black Hat Las Vegas, 2012..
    • Black Hat Las Vegas, 2012
    • Oh, J.W.1
  • 25
    • 0029345191 scopus 로고
    • ANTLR: A predicated-LL(k) parser generator
    • T. Parr and R. Quong. ANTLR: A predicated-LL(k) parser generator. Software Practice and Experience, 25:789-810, 1995..
    • (1995) Software Practice and Experience , vol.25 , pp. 789-810
    • Parr, T.1    Quong, R.2
  • 26
    • 34748920692 scopus 로고    scopus 로고
    • Argos: An emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation
    • Apr.
    • G. Portokalidis, A. Slowinska, and H. Bos. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. ACM SIGOPS Operating Systems Review, 40(4):15-27, Apr. 2006..
    • (2006) ACM SIGOPS Operating Systems Review , vol.40 , Issue.4 , pp. 15-27
    • Portokalidis, G.1    Slowinska, A.2    Bos, H.3
  • 27
    • 38949156579 scopus 로고    scopus 로고
    • Linear-time computation of similarity measures for sequential data
    • Jan.
    • K. Rieck and P. Laskov. Linear-time computation of similarity measures for sequential data. Journal of Machine Learning Research (JMLR), 9(Jan):23-48, Jan. 2008..
    • (2008) Journal of Machine Learning Research (JMLR) , vol.9 , Issue.JAN , pp. 23-48
    • Rieck, K.1    Laskov, P.2
  • 29
    • 77955182005 scopus 로고    scopus 로고
    • All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
    • E. Schwartz, T. Avgerinos, and D. Brumley. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In Proc. of IEEE Symposium on Security and Privacy, pages 317-331, 2010..
    • (2010) Proc. of IEEE Symposium on Security and Privacy , pp. 317-331
    • Schwartz, E.1    Avgerinos, T.2    Brumley, D.3
  • 39
    • 84872107422 scopus 로고    scopus 로고
    • visited February, 2013
    • D. A. Wheeler. Flawfinder. http://www.dwheeler.com/flawfinder/, visited February, 2013..
    • Flawfinder
    • Wheeler, D.A.1
  • 40
    • 24344496977 scopus 로고    scopus 로고
    • Automatic mining of source code repositories to improve bug finding techniques
    • C. C. Williams and J. K. Hollingsworth. Automatic mining of source code repositories to improve bug finding techniques. IEEE Transactions on Software Engineering, 31:466-480, 2005..
    • (2005) IEEE Transactions on Software Engineering , vol.31 , pp. 466-480
    • Williams, C.C.1    Hollingsworth, J.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.