Abstract
This paper addresses the issue of identifying buffer overrun vulnerabilities by statically analyzing C source code. We demonstrate a light-weight analysis based on modeling C string manipulations as a linear program. We also present fast, scalable solvers based on linear programming, and demonstrate techniques to make the program analysis context sensitive. Based on these techniques, we built a prototype and used it to identify several vulnerabilities in popular security critical applications.
Original language | English (US) |
---|---|
Pages (from-to) | 345-354 |
Number of pages | 10 |
Journal | Proceedings of the ACM Conference on Computer and Communications Security |
DOIs | |
State | Published - 2003 |
Externally published | Yes |
Event | Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003 - Washington, DC, United States Duration: Oct 27 2003 → Oct 31 2003 |
All Science Journal Classification (ASJC) codes
- Software
- Computer Networks and Communications
Keywords
- Buffer overruns
- Linear programming
- Static analysis