Please use this identifier to cite or link to this item:
https://research.matf.bg.ac.rs/handle/123456789/784
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Vujošević Janičić, Milena | en_US |
dc.date.accessioned | 2022-08-15T15:37:16Z | - |
dc.date.available | 2022-08-15T15:37:16Z | - |
dc.date.issued | 2008-11-17 | - |
dc.identifier.isbn | 9789898111517 | - |
dc.identifier.uri | https://research.matf.bg.ac.rs/handle/123456789/784 | - |
dc.description.abstract | We consider the problem of buffer overflows in C programs. This problem is very important because buffer overflows are suitable targets for security attacks and sources of serious programs' misbehavior. Buffer overflow bugs can be detected at run-time by dynamic analysis, and before run-time by static analysis. In this paper we present a new static, modular approach for automated detection of buffer overflows. Our approach is flow-sensitive and inter-procedural, and it deals with both statically and dynamically allocated buffers. Its architecture is flexible and pluggable - for instance, for checking generated correctness and incorrectness conditions, it can use any external automated theorem prover that follows SMT-LIB standards. The system uses an external and easily extendable knowledge database that stores all the reasoning rules so they are not hard-coded within the system. We also report on our prototype implementation, the FADO tool, and on its experimental results. | en |
dc.subject | Automated bug detection | en |
dc.subject | Buffer overflow | en |
dc.subject | C programming language | en |
dc.subject | Static analysis | en |
dc.title | Ensuring safe usage of buffers in programming language C | en_US |
dc.type | Conference Paper | en_US |
dc.relation.publication | ICSOFT 2008 - Proceedings of the 3rd International Conference on Software and Data Technologies | en_US |
dc.identifier.scopus | 2-s2.0-55849103248 | - |
dc.identifier.url | https://api.elsevier.com/content/abstract/scopus_id/55849103248 | - |
dc.contributor.affiliation | Informatics and Computer Science | en_US |
dc.relation.firstpage | 29 | en_US |
dc.relation.lastpage | 36 | en_US |
dc.relation.volume | PL | en_US |
dc.relation.issue | DPS/KE/- | en_US |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | none | - |
item.openairetype | Conference Paper | - |
crisitem.author.dept | Informatics and Computer Science | - |
crisitem.author.orcid | 0000-0001-5396-0644 | - |
Appears in Collections: | Research outputs |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.