Proceedings of the Workshop on Embedded Systems Security 2011
DOI: 10.1145/2072274.2072278
|View full text |Cite
|
Sign up to set email alerts
|

Model checking dataflow for malicious input

Abstract: Many embedded systems today are no longer isolated control units, but are fully fledged miniature desktops with their own kernel and sometimes operating system networked with the outside world. This opens up a whole new set of security issues previously not known to embedded systems. One example is potentially malicious input that exploits source code weaknesses leading to critical mission failures. In this paper we propose a new automated malicious input detection approach that works on a staged application o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…The analysis tracks all the variables on which the lock is acquired and checks if the locks on these variables are released on every program path. If not, it reports that the problem exists.Taint [28]. Taint analysis detects and reports possible vulnerabilities by performing a taint analysis.…”
mentioning
confidence: 99%
“…The analysis tracks all the variables on which the lock is acquired and checks if the locks on these variables are released on every program path. If not, it reports that the problem exists.Taint [28]. Taint analysis detects and reports possible vulnerabilities by performing a taint analysis.…”
mentioning
confidence: 99%