Proceedings of the Twenty-Second IEEE/ACM International Conference on Automated Software Engineering 2007
DOI: 10.1145/1321631.1321691
|View full text |Cite
|
Sign up to set email alerts
|

A buffer overflow benchmark for software model checkers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
58
0
1

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 68 publications
(59 citation statements)
references
References 8 publications
0
58
0
1
Order By: Relevance
“…The next four benchmarks are programs from the test suite of InvGen. The program spam also occurs as SpamAssassin-loop in [23]. The next benchmark, ex1, is an interesting variation of cav06, and ex2 is an example illustrating that splitting can be carried out in any order to obtain equivalent results in the presence of multiple splitter predicates.…”
Section: Methodsmentioning
confidence: 99%
“…The next four benchmarks are programs from the test suite of InvGen. The program spam also occurs as SpamAssassin-loop in [23]. The next benchmark, ex1, is an interesting variation of cav06, and ex2 is an example illustrating that splitting can be carried out in any order to obtain equivalent results in the presence of multiple splitter predicates.…”
Section: Methodsmentioning
confidence: 99%
“…Considerable research effort has attempted to develop static analysis tools and check security vulnerabilities in real world software applications [31], [32], [42], [80], [135]. Empirical studies have been also carried out to evaluate proposed static analysis techniques and tools [42], [80].…”
Section: Literature Reviewmentioning
confidence: 99%
“…There have been several studies in which an SMC was applied to various target systems such as automotive software [47], microcontroller programs [48], Linux device drivers [45], [46], file systems [52], network filters [13], a protocol stack [40], and server applications [41]. For a flash storage platform, which is our main target domain, one recent study [32] analyzes flash file systems as an effort of the mini-challenge [35].…”
Section: Related Workmentioning
confidence: 99%
“…They reported that several bugs were detected in a few seconds to a few minutes, but tool failures and false alarms were observed as well. Ku et al [41] applied SATABS [21] to detect buffer overflows on the 300 sample codes of server applications such as apache and sendmail. Although 90 percent of the sample codes are less than 100 lines long, they could analyze the sample codes with only minimal buffer sizes (1 and 2) to avoid explosion of analysis time.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation