2014
DOI: 10.1016/j.scico.2013.03.012
|View full text |Cite
|
Sign up to set email alerts
|

Efficient static checker for tainted variable attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…First, the output CFG must maintain the flow of types of each program point during execution, such requirement is necessary due to the dynamically typed nature of PHP [15]. Second, it is required to collect information about the complete program putting all function calls in considerations; this is the main role of the Inter-procedural data flow analysis phase [16]. Finally, the data flow analysis collects all associated information for each node [17].…”
Section: Proposed Model Implementationmentioning
confidence: 99%
“…First, the output CFG must maintain the flow of types of each program point during execution, such requirement is necessary due to the dynamically typed nature of PHP [15]. Second, it is required to collect information about the complete program putting all function calls in considerations; this is the main role of the Inter-procedural data flow analysis phase [16]. Finally, the data flow analysis collects all associated information for each node [17].…”
Section: Proposed Model Implementationmentioning
confidence: 99%
“…Previous implementations of sparse analysis [6,25] that draw information from conditionals such as cond = a < b; br(cond , l) only split the live ranges of variables used in these conditionals, e.g., a and b. We go beyond and consider transitive dependences.…”
Section: Splitting Required By Symbolic Range Analysismentioning
confidence: 99%
“…The objective of taint analysis [32,33] is to find program vulnerabilities. In this case, a harmful attack is possible when input data reaches sensitive program sites without going through special functions called sanitizers.…”
Section: Taint Analysismentioning
confidence: 99%
“…Figure 2(d) shows the intermediate representation that we create for the program in Figure 2(b). In this case, our intermediate representation is Taint analysis: The objective of taint analysis [36,37] is to find program vulnerabilities. In…”
Section: Examples Of Plv Problemsmentioning
confidence: 99%