Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation
DOI: 10.1109/scam.2001.972661
|View full text |Cite
|
Sign up to set email alerts
|

A case study in detecting software security vulnerabilities using constraint optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Some methods analyze the source code of the program. They apply different techniques, such as taint analysis , constraint analysis , pattern matching , mutation analysis , and annotation‐based analysis to detect the vulnerabilities. Because these methods require the source code of the program, they cannot be helpful in the absence of the source code.…”
Section: Related Workmentioning
confidence: 99%
“…Some methods analyze the source code of the program. They apply different techniques, such as taint analysis , constraint analysis , pattern matching , mutation analysis , and annotation‐based analysis to detect the vulnerabilities. Because these methods require the source code of the program, they cannot be helpful in the absence of the source code.…”
Section: Related Workmentioning
confidence: 99%
“…ITS4 [19], VulCAn [20]) can aid guiding code auditing in order to spot vulnerabilities caused by library functions only. Moreover, since they only perform a lexical analysis and not a dataflow analysis, they leave a lot of manual work to code auditors and they can report many false positives.…”
Section: Related Workmentioning
confidence: 99%
“…Some of them (e.g. MJOL-NIR [20], and ARCHER [21]) abstract away the code of programs to formulate a linear programming problem, in order to be scalable. Hence, constraint solvers are used and, when inconsistencies are detected, warnings are emitted.…”
Section: Related Workmentioning
confidence: 99%
“…Rule base has been used in many areas that require flexibility, extensibility, and efficiency. For example, rulebase has been successfully applied in the code analysis to detect software vulnerability [43], [45]. These approaches can discover potential code fragments in software that may expose to the buffer overrun attack.…”
Section: Related Workmentioning
confidence: 99%