Buffer Overrun Detection Using Linear Programming and Static Analysis

dc.contributor.authorGanapathy, Vinoden_US
dc.contributor.authorJha, Someshen_US
dc.contributor.authorChandler, Daviden_US
dc.contributor.authorMelski, Daviden_US
dc.contributor.authorVitek, Daviden_US
dc.date.accessioned2012-03-15T17:17:34Z
dc.date.available2012-03-15T17:17:34Z
dc.date.created2003en_US
dc.date.issued2003
dc.description.abstractThis paper addresses the issue of identifiing buffer overrun vulnerabilities by statically analyzing C source code. We demonstrate a scalable analysis based on modeling C string manipulations as a linear program. We also present fast, scalable solvers based on linear programming, and demonstrate how to make the analysis context sensitive. Based on these techniques, we built a prototype and used it to identify several vulnerabilities in popular security critical applications.en_US
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationTR1488en_US
dc.identifier.urihttp://digital.library.wisc.edu/1793/60368
dc.publisherUniversity of Wisconsin-Madison Department of Computer Sciencesen_US
dc.titleBuffer Overrun Detection Using Linear Programming and Static Analysisen_US
dc.typeTechnical Reporten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR1488.pdf
Size:
3.2 MB
Format:
Adobe Portable Document Format