2010
DOI: 10.1145/1646353.1646374
|View full text |Cite
|
Sign up to set email alerts
|

A few billion lines of code later

Abstract: How Coverity built a bug-finding tool, and a business, around the unlimited supply of bugs in software systems.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0
1

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 473 publications
(48 citation statements)
references
References 8 publications
0
47
0
1
Order By: Relevance
“…This exploit, reported as CVE-2014-0659 5 and sourced from the Metasploit Framework, attacks undocumented and badly-designed features of the scfgmgr service to remotely dump system configuration variables from NVRAM and obtain a shell. Public documentation for this vulnerability suggests that, as of 2015-01-28, it was known to affect firmware for networking devices manufactured by Cisco, Linksys, Netgear, and a variety of smaller vendors.…”
Section: ) Sercomm Configuration Dump (#47)mentioning
confidence: 99%
See 1 more Smart Citation
“…This exploit, reported as CVE-2014-0659 5 and sourced from the Metasploit Framework, attacks undocumented and badly-designed features of the scfgmgr service to remotely dump system configuration variables from NVRAM and obtain a shell. Public documentation for this vulnerability suggests that, as of 2015-01-28, it was known to affect firmware for networking devices manufactured by Cisco, Linksys, Netgear, and a variety of smaller vendors.…”
Section: ) Sercomm Configuration Dump (#47)mentioning
confidence: 99%
“…While this approach scales to thousands of firmware images, it suffers from the classic trade-offs of static analysis. Namely, either the analysis is very generic and produces a large number of false positives [5], or the analysis is too specific and results in many false negatives. Additionally, static analysis techniques based on program analysis usually target a specific problem domain, such as the C, PHP, or Java programming language, or alternatively binary code.…”
Section: Introductionmentioning
confidence: 99%
“…Developers build trust with analysis tools, and this trust is quickly lost if they do not understand the tool's output [8]. We also have found (by examining bug reports filed against analyzers) that many analysis results have confusingly worded messages; this is typically an easy problem to fix.…”
Section: Make Data-driven Usability Improvementsmentioning
confidence: 99%
“…• Static code analysis using Coverity [12] • Dynamic code analysis using Valgrind, AddressSanitizer [13] and UndefinedBehaviorSanitizer [14] • Regular CPU timing measurements on dedicated machines similar to the HLT farm nodes • Profile-guided optimisation using Callgrind [15] and GOoDA [16] …”
Section: Profiling and Validationmentioning
confidence: 99%