2015
DOI: 10.1007/978-3-319-26362-5_12
|View full text |Cite
|
Sign up to set email alerts
|

Improving Accuracy of Static Integer Overflow Detection in Binary

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…There is a large body of research work focusing on integer overflow detection: ARCHER [9], UQBTng [53], PREfast [28], Rich [3], SAGE [20], CBMC [10], IntScope [51], Brick [7], IntFinder [6], SmartFuzz [37], PREfix [39], IntPatch [55], IOC [14], IntFlow [44], SoupInt [50], SIFT [24], TAP [45], Diode [46], Indio [56], Zhang et al [54], and IntEQ [48]. In contrast, only few approaches focus explicitly on integer overflow repairs: CIntFix [8], SoupInt [24], CodePhage [47], TAP [45], and SIFT [24].…”
Section: Related Workmentioning
confidence: 99%
“…There is a large body of research work focusing on integer overflow detection: ARCHER [9], UQBTng [53], PREfast [28], Rich [3], SAGE [20], CBMC [10], IntScope [51], Brick [7], IntFinder [6], SmartFuzz [37], PREfix [39], IntPatch [55], IOC [14], IntFlow [44], SoupInt [50], SIFT [24], TAP [45], Diode [46], Indio [56], Zhang et al [54], and IntEQ [48]. In contrast, only few approaches focus explicitly on integer overflow repairs: CIntFix [8], SoupInt [24], CodePhage [47], TAP [45], and SIFT [24].…”
Section: Related Workmentioning
confidence: 99%
“…Detecting IO bugs: There have been a number of approaches developed to detect integer overflow at the source code level. These approaches can be classified into two categories: (a) instrumenting the source code with run-time integer overflow check [37][38][39], and (b) using static analysis to detect integer overflow [40][41][42]. Of these, the work of Coker and Hafiz [40] comes closest to the work presented here, by introducing a set of refactoring and rewrite rules to apply in an IDE to fix overflows in C programs.…”
Section: Related Workmentioning
confidence: 99%
“…Automatic Vulnerability Discovery ś Many automatic vulnerability detection systems operate at the function level, both for ease of analysis, and because it is a suitable search-granularity for common bugs, such as stack-based bugs [7,12,20]. Operating at the function level is also useful for interoperability with other binary analysis primitives, such as symbolic execution, which are powerful tools for semantic analysis but do not scale to full binaries [7].…”
Section: Applicationsmentioning
confidence: 99%