Mitigating program security vulnerabilities: Approaches and challenges

H Shahriar, M Zulkernine - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Programs are implemented in a variety of languages and contain serious vulnerabilities
which might be exploited to cause security breaches. These vulnerabilities have been …

SoftBound: Highly compatible and complete spatial memory safety for C

S Nagarakatte, J Zhao, MMK Martin… - Proceedings of the 30th …, 2009 - dl.acm.org
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking
are well known, yet C and C++ remain in widespread use. Unfortunately, C's arbitrary …

Secure program execution via dynamic information flow tracking

GE Suh, JW Lee, D Zhang, S Devadas - ACM Sigplan Notices, 2004 - dl.acm.org
We present a simple architectural mechanism called dynamic information flow tracking that
can significantly improve the security of computing systems with negligible performance …

Predicting vulnerable software components

S Neuhaus, T Zimmermann, C Holler… - Proceedings of the 14th …, 2007 - dl.acm.org
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines
existing vulnerability databases and version archives to map past vulnerabilities to …

[КНИГА][B] Feasibility and Infeasibility in Optimization:: Algorithms and Computational Methods

JW Chinneck - 2007 - books.google.com
Constrained optimization models are core tools in business, science, government, and the
military with applications including airline scheduling, control of petroleum refining …

Methods and arrangements for unified program analysis

TR Jaeger, L Koved, L Zeng, X Zhang - US Patent 7,493,602, 2009 - Google Patents
(57) ABSTRACT A unified program analysis framework that facilitates the analysis of
complex multi-language Software systems, analy sis reuse, and analysis comparison, by …

Backwards-compatible array bounds checking for C with very low overhead

D Dhurjati, V Adve - Proceedings of the 28th international conference on …, 2006 - dl.acm.org
The problem of enforcing correct usage of array and pointer references in C and C++
programs remains unsolved. The approach proposed by Jones and Kelly (extended by …

Loop-extended symbolic execution on binary programs

P Saxena, P Poosankam, S McCamant… - Proceedings of the …, 2009 - dl.acm.org
Mixed concrete and symbolic execution is an important technique for finding and
understanding software bugs, including security-relevant ones. However, existing symbolic …

SAFECode: Enforcing alias analysis for weakly typed languages

D Dhurjati, S Kowshik, V Adve - ACM SIGPLAN Notices, 2006 - dl.acm.org
Static analysis of programs in weakly typed languages such as C and C++ is generally not
sound because of possible memory errors due to dangling pointer references, uninitialized …

An efficient and backwards-compatible transformation to ensure memory safety of C programs

W Xu, DC DuVarney, R Sekar - Proceedings of the 12th ACM SIGSOFT …, 2004 - dl.acm.org
Memory-related errors, such as buffer overflows and dangling pointers, remain one of the
principal reasons for failures of C programs. As a result, a number of recent research efforts …