-
2
-
-
85080734932
-
-
ext4: fixpoint divide exception at ext4_fill_super. Bug 14287, Linux kernel
-
ext4: fixpoint divide exception at ext4_fill_super. Bug 14287, Linux kernel, 2009. https://bugzilla.kernel.org/show_bug.cgi?id=14287.
-
(2009)
-
-
-
4
-
-
79952020076
-
Rich: Automatically protecting against integer-based vulnerabilities
-
San Diego, CA, Feb-Mar
-
D. Brumley, T. Chiueh, and R. Johnson. RICH: Automatically protecting against integer-based vulnerabilities. In Proceedings of the 14th Annual Network and Distributed System Security Symposium, San Diego, CA, Feb-Mar 2007.
-
(2007)
Proceedings of the 14th Annual Network and Distributed System Security Symposium
-
-
Brumley, D.1
Chiueh, T.2
Johnson, R.3
-
6
-
-
0033688092
-
A static analyzer for finding dynamic programming errors
-
W. R. Bush, J. D. Pincus, and D. J. Sielaff. A static analyzer for finding dynamic programming errors. Software-Practice and Experience, 30(7):775-802, 2000.
-
(2000)
Software-Practice and Experience
, vol.30
, Issue.7
, pp. 775-802
-
-
Bush, W.R.1
Pincus, J.D.2
Sielaff, D.J.3
-
7
-
-
67650790221
-
Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
San Diego, CA, Dec
-
C. Cadar, D. Dunbar, and D. Engler. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the 8th Symposium on Operating Systems Design and Implementation, San Diego, CA, Dec 2008.
-
(2008)
Proceedings of the 8th Symposium on Operating Systems Design and Implementation
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.3
-
8
-
-
33746391935
-
Using type qualifiers to analyze untrusted integers and detecting security flaws in C programs
-
Berlin, Germany, Jul
-
E. N. Ceesay, J. Zhou, M. Gertz, K. Levitt, and M. Bishop. Using type qualifiers to analyze untrusted integers and detecting security flaws in C programs. In Proceedings of the 3rd GI/IEEE SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment, pages 1-16, Berlin, Germany, Jul 2006.
-
(2006)
Proceedings of the 3rd GI/IEEE SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment
, pp. 1-16
-
-
Ceesay, E.N.1
Zhou, J.2
Gertz, M.3
Levitt, K.4
Bishop, M.5
-
9
-
-
84863145383
-
Linux kernel vulnerabilities: State-of-the-art defenses and open problems
-
Shanghai, China, Jul
-
H. Chen, Y. Mao, X. Wang, D. Zhou, N. Zeldovich, and M. F. Kaashoek. Linux kernel vulnerabilities: State-of-the-art defenses and open problems. In Proceedings of the 2nd Asia-Pacific Workshop on Systems, Shanghai, China, Jul 2011.
-
(2011)
Proceedings of the 2nd Asia-Pacific Workshop on Systems
-
-
Chen, H.1
Mao, Y.2
Wang, X.3
Zhou, D.4
Zeldovich, N.5
Kaashoek, M.F.6
-
10
-
-
76549130517
-
Intfinder: Automatically detecting integer bugs in x86 binary program
-
Beijing, China, Dec
-
P. Chen, H. Han, Y. Wang, X. Shen, X. Yin, B. Mao, and L. Xie. IntFinder: Automatically detecting integer bugs in x86 binary program. In Proceedings of the 11th International Conference on Information and Communications Security, pages 336-345, Beijing, China, Dec 2009.
-
(2009)
Proceedings of the 11th International Conference on Information and Communications Security
, pp. 336-345
-
-
Chen, P.1
Han, H.2
Wang, Y.3
Shen, X.4
Yin, X.5
Mao, B.6
Xie, L.7
-
11
-
-
35048883071
-
Archerr: Runtime environment driven program safety
-
Sophia Antipolis, France, Sep
-
R. Chinchani, A. Iyer, B. Jayaraman, and S. Upadhyaya. ARCHERR: Runtime environment driven program safety. In Proceedings of the 9th European Symposium on Research in Computer Security, pages 385-406, Sophia Antipolis, France, Sep 2004.
-
(2004)
Proceedings of the 9th European Symposium on Research in Computer Security
, pp. 385-406
-
-
Chinchani, R.1
Iyer, A.2
Jayaraman, B.3
Upadhyaya, S.4
-
14
-
-
79952022137
-
As-if infinitely ranged integer model
-
San Jose, CA, Nov
-
R. B. Dannenberg, W. Dormann, D. Keaton, T. Plum, R. C. Seacord, D. Svoboda, A. Volkovitsky, and T. Wilson. As-if infinitely ranged integer model. In Proceedings of the 21st IEEE International Symposium on Software Reliability Engineering, pages 91-100, San Jose, CA, Nov 2010.
-
(2010)
Proceedings of the 21st IEEE International Symposium on Software Reliability Engineering
, pp. 91-100
-
-
Dannenberg, R.B.1
Dormann, W.2
Keaton, D.3
Plum, T.4
Seacord, R.C.5
Svoboda, D.6
Volkovitsky, A.7
Wilson, T.8
-
15
-
-
84864257990
-
Understanding integer overflow in C/C++
-
Zurich, Switzerland, Jun
-
W. Dietz, P. Li, J. Regehr, and V. Adve. Understanding integer overflow in C/C++. In Proceedings of the 34th International Conference on Software Engineering, Zurich, Switzerland, Jun 2012.
-
(2012)
Proceedings of the 34th International Conference on Software Engineering
-
-
Dietz, W.1
Li, P.2
Regehr, J.3
Adve, V.4
-
16
-
-
85011293817
-
LClint: A tool for using specifications to check code
-
New Orleans, LA, Dec
-
D. Evans, J. V. Guttag, J. J. Horning, and Y. M. Tan. LCLint: A tool for using specifications to check code. In Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering, pages 87-96, New Orleans, LA, Dec 1994.
-
(1994)
Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering
, pp. 87-96
-
-
Evans, D.1
Guttag, J.V.2
Horning, J.J.3
Tan, Y.M.4
-
17
-
-
84942510639
-
-
Technical Note CMU/SEI-2007-TN-027, Carnegie Mellon University
-
J. Gennari, S. Hedrick, F. Long, J. Pincar, and R. C. Seacord. Ranged integers for the C programming language. Technical Note CMU/SEI-2007-TN-027, Carnegie Mellon University, 2007.
-
(2007)
Ranged Integers for the C Programming Language
-
-
Gennari, J.1
Hedrick, S.2
Long, F.3
Pincar, J.4
Seacord, R.C.5
-
18
-
-
0017494622
-
Compiler analysis of the value ranges for variables
-
SE May
-
W. H. Harrison. Compiler analysis of the value ranges for variables. IEEE Transactions on Software Engineering, SE-3(3):243-250, May 1977.
-
(1977)
IEEE Transactions on Software Engineering
, vol.3
, Issue.3
, pp. 243-250
-
-
Harrison, W.H.1
-
19
-
-
84859476272
-
Big loop integer protection
-
O. Horovitz. Big loop integer protection. Phrack, 9(60), 2002.
-
(2002)
Phrack
, vol.9
, Issue.60
-
-
Horovitz, O.1
-
21
-
-
0004301215
-
-
ISO/IEC 9899: ISO/IEC, 2011
-
ISO/IEC 9899:2011, Programming languages - C. ISO/IEC, 2011.
-
(2011)
Programming Languages - C
-
-
-
24
-
-
84874115781
-
LLBMC: Bounded model checking of C and C++ programs using a compiler IR
-
Philadelphia, PA, Jan
-
F. Merz, S. Falke, and C. Sinz. LLBMC: Bounded model checking of C and C++ programs using a compiler IR. In Proceedings of the 4th International Conference on Verified Software: Theories, Tools, and Experiments, Philadelphia, PA, Jan 2012.
-
(2012)
Proceedings of the 4th International Conference on Verified Software: Theories, Tools, and Experiments
-
-
Merz, F.1
Falke, S.2
Sinz, C.3
-
25
-
-
84893320590
-
Dynamic test generation to find integer bugs in x86 binary Linux programs
-
Montreal, Canada, Aug
-
D. Molnar, X. C. Li, and D. A. Wagner. Dynamic test generation to find integer bugs in x86 binary Linux programs. In Proceedings of the 18th USENIX Security Symposium, pages 67-81, Montreal, Canada, Aug 2009.
-
(2009)
Proceedings of the 18th USENIX Security Symposium
, pp. 67-81
-
-
Molnar, D.1
Li, X.C.2
Wagner, D.A.3
-
27
-
-
77956571506
-
Modular bug-finding for integer overflows in the large: Sound, efficient, bit-precise static analysis
-
Microsoft Research
-
Y. Moy, N. Bjørner, and D. Sielaff. Modular bug-finding for integer overflows in the large: Sound, efficient, bit-precise static analysis. Technical Report MSR-TR-2009-57, Microsoft Research, 2009.
-
(2009)
Technical Report MSR-TR-2009-57
-
-
Moy, Y.1
Bjørner, N.2
Sielaff, D.3
-
34
-
-
77955873477
-
Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution
-
San Diego, CA, Feb
-
T. Wang, T. Wei, Z. Lin, and W. Zou. IntScope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution. In Proceedings of the 16th Annual Network and Distributed System Security Symposium, San Diego, CA, Feb 2007.
-
(2007)
Proceedings of the 16th Annual Network and Distributed System Security Symposium
-
-
Wang, T.1
Wei, T.2
Lin, Z.3
Zou, W.4
-
35
-
-
84866981334
-
Undefined behavior: What happened to my code?
-
Seoul, South Korea, Jul
-
X. Wang, H. Chen, A. Cheung, Z. Jia, N. Zeldovich, and M. F. Kaashoek. Undefined behavior: What happened to my code? In Proceedings of the 3rd ACM SIGOPS Asia-Pacific Workshop on Systems, Seoul, South Korea, Jul 2012.
-
(2012)
Proceedings of the 3rd ACM SIGOPS Asia-Pacific Workshop on Systems
-
-
Wang, X.1
Chen, H.2
Cheung, A.3
Jia, Z.4
Zeldovich, N.5
Kaashoek, M.F.6
-
36
-
-
76549117792
-
UQBTNG: A tool capable of automatically finding integer overflows in Win32 binaries
-
Berlin, Germany, Dec
-
R. Wojtczuk. UQBTng: A tool capable of automatically finding integer overflows in Win32 binaries. In Proceedings of the 22nd Chaos Communication Congress, Berlin, Germany, Dec 2005.
-
(2005)
Proceedings of the 22nd Chaos Communication Congress
-
-
Wojtczuk, R.1
-
38
-
-
78049414309
-
IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time
-
Athens, Greece, Sep
-
C. Zhang, T. Wang, T. Wei, Y. Chen, and W. Zou. IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time. In Proceedings of the 15th European Symposium on Research in Computer Security, pages 71-86, Athens, Greece, Sep 2010.
-
(2010)
Proceedings of the 15th European Symposium on Research in Computer Security
, pp. 71-86
-
-
Zhang, C.1
Wang, T.2
Wei, T.3
Chen, Y.4
Zou, W.5
|