期刊文献+

RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow

RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow
下载PDF
导出
出处 《China Communications》 SCIE CSCD 2010年第6期10-16,共7页 中国通信(英文版)
基金 Supported by the National Natural Science Foundation of China (60903188), Shanghai Education Commission Innovation Foundation (11YZ192) and World Expo Science and Technology Special Fund of Shanghai Science and Technology Commission (08dz0580202).
关键词 缓冲区溢出 整数溢出 溢出漏洞 执行文件 汇编语言 检查点 反编译 字符串 integer overflow format string overflow buffer overflow
  • 相关文献

参考文献15

  • 1WANG T L, WEI T, LIN Z Q, et al. Intscope: Automatically Detecting Integer Overflow Vulnerability in x86 Binary Using Symbolic Execution [C]// Proceedings of the 16th Network and Distributed System Security Symposium. San Diego, CA, 2009: 1-14.
  • 2张实睿,许蕾,徐宝文.一种防止缓冲区溢出的整数溢出检测方法(英文)[J].Journal of Southeast University(English Edition),2009,25(2):219-223. 被引量:3
  • 3CADAR C, DUNBAR D, ENGLER D. Klee: Unassisted and Automatic Generation of High-coverage Tests for Complex Systems Programs [C]//Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'08). San Diego, CA, 2008: 209-224.
  • 4BRUNMLEY D, CHIUEH T C, JOHNSON R, et al. Rich: Automatically Protecting Against Integer-based Vulnerabilities [C]// Proceedings of the 14th Annual Network and Distributed System Security Symposium(NDSS). San Diego, 2007.
  • 5CADAR C, GANESHA V, PAWLOWSKI P M, et al. Exe:Automatically Generating Inputs of Death [C]//Proceedings of the 13th ACM Conference on CCS, Virginia. New York: ACM, 2006: 322-335.
  • 6DOR N, RODEH M, SAGIV M. Cssv: Towards a Realistic Tool for Statically Detecting All Buffer Overflows [C]// Proceedings of the ACM SIGPLAN2003 Conference on Programming Language Design and Implementation. New York: ACM, 2003: 155-167.
  • 7HAUGH E, BISHOP M. Testing C Programs for Buffer Overflow Vulnerabilities [C]//Proceedings of the 10th Network and Distributed System Security Symposium. SanDiego, 2003: 123-130.
  • 8WILANDER J, KAMKAR M. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention [C]// Proceedings of the 10th NDSS. SanDiego, 2003: 149-162.
  • 9LHEE K S, CHAPIN S J. Buffer Overflow and Format String Overflow Vulnerabilities [J]. Sofware: Practice and Experience, 2003, 33(5): 423-460.
  • 10GOK M. Integer Squarers with Overflow Detection [J]. Computers and Electrical Engineering, 2008, 34 (5): 378- 391.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部