2008
DOI: 10.1016/j.cor.2007.01.013
|View full text |Cite
|
Sign up to set email alerts
|

Detecting buffer overflow via automatic test input data generation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(34 citation statements)
references
References 13 publications
0
34
0
Order By: Relevance
“…Del Grosso et al [12] used SBST to exercise statements statically detected as vulnerable. By rewarding multiple execution of such vulnerable statements, the search is led towards filling buffers, likely finding buffer overflows.…”
Section: Sbst and Automated Oraclesmentioning
confidence: 99%
“…Del Grosso et al [12] used SBST to exercise statements statically detected as vulnerable. By rewarding multiple execution of such vulnerable statements, the search is led towards filling buffers, likely finding buffer overflows.…”
Section: Sbst and Automated Oraclesmentioning
confidence: 99%
“…Parameters of the genetic algorithm have been set up according to what proposed in literature [8]. In particular an elitist approach has been adopted, with the 10% of the best individuals kept alive across generations.…”
Section: Methodsmentioning
confidence: 99%
“…This approach has been extended [19] to test object oriented code, by searching not only for input values, but also for a method invocation sequence. Del Grosso et al [8] applied genetic algorithms to identify tests to expose buffer overflows using a complex fitness function. Tests are searched with high statement coverage, that execute lots of vulnerable statements and deeply nested code, and that write data as near as possible to the buffer boundary.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, static heuristic solutions may not by applicable in practice. It has been recognized that despite the considerable effort to statically and automatically tackle buffer overflow defects, in many cases concretely executing the program under test is the only way to address this problem [60], [115]. In our proposed approach, we use static analysis, particularly static runtime verification approaches such as DEPUTY [31] and CCURED [97], to pinpoint potential overflow vulnerabilities on buffer operations.…”
Section: Approachmentioning
confidence: 99%