메뉴 건너뛰기




Volumn , Issue , 2000, Pages

A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.

Author keywords

[No Author keywords available]

Indexed keywords

C (PROGRAMMING LANGUAGE); NETWORK SECURITY;

EID: 85081874807     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (401)

References (61)
  • 2
    • 84957037636 scopus 로고    scopus 로고
    • A toolkit for constructing type- and constraint-based program analyses
    • Springer-Verlag
    • A. Aiken, M. Fähndrich, J.S. Foster, Z. Su, "A toolkit for constructing type- and constraint-based program analyses," TIC'98: Types in Compilation, Springer-Verlag, 1998, pp.78-96.
    • (1998) TIC'98: Types in Compilation , pp. 78-96
    • Aiken, A.1    Fähndrich, M.2    Foster, J.S.3    Su, Z.4
  • 3
    • 37148999612 scopus 로고    scopus 로고
    • Efficient Detection of All Pointer and Array Access Errors
    • ACM
    • T.M. Austin, S.E. Breach, G.S. Sohi, "Efficient Detection of All Pointer and Array Access Errors," PLDI'94, ACM.
    • PLDI'94
    • Austin, T.M.1    Breach, S.E.2    Sohi, G.S.3
  • 5
    • 0344839461 scopus 로고
    • The SUP-INF method in Presburger arithmetic
    • Memo ATP-18, Math Dept., U. Texas Austin, Dec
    • W.W. Bledsoe, "The SUP-INF method in Presburger arithmetic,", Memo ATP-18, Math Dept., U. Texas Austin, Dec. 1974.
    • (1974)
    • Bledsoe, W.W.1
  • 6
    • 85180760348 scopus 로고    scopus 로고
    • Abstract debugging of higher-order imperative languages
    • ACM
    • F. Bourdoncle, "Abstract debugging of higher-order imperative languages," PLDI'93, ACM.
    • PLDI'93
    • Bourdoncle, F.1
  • 9
    • 0028732490 scopus 로고
    • Improved algorithms for linear inequalities with two variables per inequality
    • Dec
    • E. Cohen, N. Megiddo, "Improved algorithms for linear inequalities with two variables per inequality," SIAM J. Computing, vol.23 no.6, pp.1313-1347, Dec. 1994.
    • (1994) SIAM J. Computing , vol.23 , Issue.6 , pp. 1313-1347
    • Cohen, E.1    Megiddo, N.2
  • 11
    • 85035003357 scopus 로고
    • Automatic Discovery of Linear Restraints among Variables of a Program
    • P. Cousot, N. Halbwachs, "Automatic Discovery of Linear Restraints among Variables of a Program," 5th ACM POPL, 1978, pp.84-97.
    • (1978) 5th ACM POPL , pp. 84-97
    • Cousot, P.1    Halbwachs, N.2
  • 14
    • 0023386175 scopus 로고
    • Constraint propagation with interval labels
    • July
    • E. Davis, "Constraint propagation with interval labels," Artificial Intelligence, vol.32 no.3, July 1987, pp.281-331.
    • (1987) Artificial Intelligence , vol.32 , Issue.3 , pp. 281-331
    • Davis, E.1
  • 19
    • 85086348218 scopus 로고    scopus 로고
    • Static detection of dynamic memory errors
    • D. Evans, "Static detection of dynamic memory errors," PLDI'96.
    • PLDI'96
    • Evans, D.1
  • 21
  • 22
    • 0027568719 scopus 로고
    • Optimizing array bound checks using flow analysis
    • Mar.-Dec
    • R. Gupta, "Optimizing array bound checks using flow analysis," ACM Letters on Programming Languages and Systems, vol.2 no.1-4, Mar.-Dec. 1993, pp.135-150.
    • (1993) ACM Letters on Programming Languages and Systems , vol.2 , Issue.1-4 , pp. 135-150
    • Gupta, R.1
  • 23
    • 84974710035 scopus 로고
    • Verification of linear hybrid systems by means of convex approximations
    • Springer-Verlag
    • N. Halbwachs, Y.-E. Proy, P. Raymond, "Verification of linear hybrid systems by means of convex approximations," SAS'94: Static Analysis Symp., Springer-Verlag, 1994, pp.223-237.
    • (1994) SAS'94: Static Analysis Symp , pp. 223-237
    • Halbwachs, N.1    Proy, Y.-E.2    Raymond, P.3
  • 26
    • 85180767776 scopus 로고    scopus 로고
    • STAN: A static analyzer for CLP(R) based on abstract interpretation
    • M. Handjieva, "STAN: A static analyzer for CLP(R) based on abstract interpretation," SAS'96: Static Analysis Symp.
    • SAS'96: Static Analysis Symp
    • Handjieva, M.1
  • 27
    • 0017494622 scopus 로고
    • Compiler analysis of the value ranges for variables
    • May
    • W.H. Harrison, "Compiler analysis of the value ranges for variables," IEEE Trans. Software Engineering, vol.SE-3 no.3, May 1977, pp.243-250.
    • (1977) IEEE Trans. Software Engineering , vol.SE-3 , Issue.3 , pp. 243-250
    • Harrison, W.H.1
  • 30
    • 0028730912 scopus 로고
    • Simple and fast algorithms for linear and integer programs with two variables per inequality
    • Dec
    • D.S. Hochbaum, J.S. Naor, "Simple and fast algorithms for linear and integer programs with two variables per inequality," SIAM J. Computing, vol.23 no.6, Dec. 1994, pp. 1179-1192.
    • (1994) SIAM J. Computing , vol.23 , Issue.6 , pp. 1179-1192
    • Hochbaum, D.S.1    Naor, J.S.2
  • 31
    • 85180753911 scopus 로고    scopus 로고
    • D. Holland, http://www.hcs.harvard.edu/dholland/computers/netkit.html.
    • Holland, D.1
  • 32
    • 44049111346 scopus 로고
    • Constraint reasoning based on interval arithmetic: the tolerance propagation approach
    • E. Hyvönen, "Constraint reasoning based on interval arithmetic: the tolerance propagation approach," Artificial Intelligence, vol.58, 1992, pp.71-112.
    • (1992) Artificial Intelligence , vol.58 , pp. 71-112
    • Hyvönen, E.1
  • 33
    • 85180765878 scopus 로고    scopus 로고
    • http://www.infilsec.com/vulnerabilities/.
  • 38
    • 0025674986 scopus 로고
    • Linear programming with two variables per inequality in poly-log time
    • Dec
    • G. Lueker, N. Megiddo, V. Ramachandran, "Linear programming with two variables per inequality in poly-log time," SIAM J. Computing, vol.19 no.6, Dec. 1990, pp.1000-1010.
    • (1990) SIAM J. Computing , vol.19 , Issue.6 , pp. 1000-1010
    • Lueker, G.1    Megiddo, N.2    Ramachandran, V.3
  • 39
    • 84976671430 scopus 로고
    • Optimization of range checking
    • Proc. Symp. on Compiler Construction, June
    • V. Markstein, J. Cocke, P. Markstein, "Optimization of range checking," SIGPLAN Notices, vol.17 no.6, Proc. Symp. on Compiler Construction, June 1982, p.114-119.
    • (1982) SIGPLAN Notices , vol.17 , Issue.6 , pp. 114-119
    • Markstein, V.1    Cocke, J.2    Markstein, P.3
  • 41
    • 0025557712 scopus 로고
    • An empirical study of the reliability of Unix utilities
    • Dec
    • B.P. Miller, L. Fredricksen, B. So, "An empirical study of the reliability of Unix utilities," CACM, vol.33 no.12, Dec. 1990, pp.32-44.
    • (1990) CACM , vol.33 , Issue.12 , pp. 32-44
    • Miller, B.P.1    Fredricksen, L.2    So, B.3
  • 43
    • 85180765771 scopus 로고    scopus 로고
    • strlcpy and strlcat-Consistent, Safe, String Copy and Concatenation
    • USENIX Assoc., Berkeley, CA
    • T.C. Miller, T. de Raadt, "strlcpy and strlcat-Consistent, Safe, String Copy and Concatenation," FREENIX'99, USENIX Assoc., Berkeley, CA.
    • FREENIX'99
    • Miller, T.C.1    de Raadt, T.2
  • 45
    • 84961727822 scopus 로고    scopus 로고
    • The Design and Implementation of a Certifying Compiler
    • G.C. Necula, P. Lee, "The Design and Implementation of a Certifying Compiler," PLDI'98.
    • PLDI'98
    • Necula, G.C.1    Lee, P.2
  • 46
    • 85180781689 scopus 로고    scopus 로고
    • NuMega BoundsChecker, http://www.numega.com/products/aed/vc-more.shtml.
    • NuMega BoundsChecker
  • 47
    • 47349088015 scopus 로고    scopus 로고
    • Accurate Static Branch Prediction by Value Range Propagation
    • J. Patterson. "Accurate Static Branch Prediction by Value Range Propagation". PLDI'95, pp.67-78.
    • PLDI'95 , pp. 67-78
    • Patterson, J.1
  • 48
    • 85180790269 scopus 로고    scopus 로고
    • Phrack Magazine, Sep
    • Phrack Magazine, "The Frame Pointer Overwrite," Sep. 1999, vol.9 no.55.
    • (1999) The Frame Pointer Overwrite , vol.9 , Issue.55
  • 50
    • 0026974538 scopus 로고    scopus 로고
    • Eliminating false data dependences using the Omega test
    • W. Pugh, D. Wonnacott, "Eliminating false data dependences using the Omega test," PLDI'92, pp.140-151.
    • PLDI'92 , pp. 140-151
    • Pugh, W.1    Wonnacott, D.2
  • 51
    • 85180768699 scopus 로고    scopus 로고
    • Pure Atria Purify, http://www.rational.com/products/purify-unix/index.jtmpl.
    • Pure Atria Purify
  • 54
    • 84978282082 scopus 로고    scopus 로고
    • The effects of precision of pointer analysis
    • Springer-Verlag
    • M. Shapiro, S. Horwitz, "The effects of precision of pointer analysis," SAS'97: Static Analysis Symp., Springer-Verlag, pp.16-34.
    • SAS'97: Static Analysis Symp , pp. 16-34
    • Shapiro, M.1    Horwitz, S.2
  • 55
    • 84976719228 scopus 로고
    • On the SUP-INF method for proving Presburger formulas
    • Oct
    • R. Shostak, "On the SUP-INF method for proving Presburger formulas," J. ACM, vol.24 no.4, Oct. 1977, pp.529-543.
    • (1977) J. ACM , vol.24 , Issue.4 , pp. 529-543
    • Shostak, R.1
  • 56
    • 0019621772 scopus 로고
    • Deciding linear inequalities by computing loop residues
    • Oct
    • R. Shostak, "Deciding linear inequalities by computing loop residues," J. ACM, vol.28 no.4, Oct. 1981, pp.769-779.
    • (1981) J. ACM , vol.28 , Issue.4 , pp. 769-779
    • Shostak, R.1
  • 57
    • 85180738970 scopus 로고    scopus 로고
    • Implementation of array bound checker
    • N. Sosuki, K. Ishihata, "Implementation of array bound checker," POPL'77, pp.132-143.
    • POPL'77 , pp. 132-143
    • Sosuki, N.1    Ishihata, K.2
  • 58
    • 0002868937 scopus 로고
    • Constraint satisfaction using constraint logic programming
    • P. Van Hentenryck, H. Simonis, M. Dincbas, "Constraint satisfaction using constraint logic programming," Artificial Intelligence, vol.58, 1992, pp.113-159.
    • (1992) Artificial Intelligence , vol.58 , pp. 113-159
    • Van Hentenryck, P.1    Simonis, H.2    Dincbas, M.3
  • 60
    • 0031643965 scopus 로고    scopus 로고
    • Eliminating array bound checking through dependent types
    • H. Xi, F. Pfenning, "Eliminating array bound checking through dependent types," PLDI'98, pp.249-257.
    • PLDI'98 , pp. 249-257
    • Xi, H.1    Pfenning, F.2
  • 61
    • 85088333867 scopus 로고    scopus 로고
    • Dependent Types in Practical Programming
    • H. Xi, F. Pfenning, "Dependent Types in Practical Programming," POPL'99.
    • POPL'99
    • Xi, H.1    Pfenning, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.