A systematic literature review of actionable alert identification techniques for automated static code analysis
CONTEXT: Automated static analysis (ASA) identifies potential source code anomalies early
in the software development lifecycle that could lead to field failures. Excessive alert …
in the software development lifecycle that could lead to field failures. Excessive alert …
Mitigating program security vulnerabilities: Approaches and challenges
Programs are implemented in a variety of languages and contain serious vulnerabilities
which might be exploited to cause security breaches. These vulnerabilities have been …
which might be exploited to cause security breaches. These vulnerabilities have been …
Beacon: Directed grey-box fuzzing with provable path pruning
Unlike coverage-based fuzzing that gives equal attention to every part of a code, directed
fuzzing aims to direct a fuzzer to a specific target in the code, eg, the code with potential …
fuzzing aims to direct a fuzzer to a specific target in the code, eg, the code with potential …
Analyzing inter-application communication in Android
Modern smartphone operating systems support the development of third-party applications
with open system APIs. In addition to an open API, the Android operating system also …
with open system APIs. In addition to an open API, the Android operating system also …
EXE: Automatically generating inputs of death
This article presents EXE, an effective bug-finding tool that automatically generates inputs
that crash real code. Instead of running code on manually or randomly constructed input …
that crash real code. Instead of running code on manually or randomly constructed input …
SoftBound: Highly compatible and complete spatial memory safety for C
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking
are well known, yet C and C++ remain in widespread use. Unfortunately, C's arbitrary …
are well known, yet C and C++ remain in widespread use. Unfortunately, C's arbitrary …
[PDF][PDF] Finding Security Vulnerabilities in Java Applications with Static Analysis.
This paper proposes a static analysis technique for detecting many recently discovered
application vulnerabilities such as SQL injections, cross-site scripting, and HTTP splitting …
application vulnerabilities such as SQL injections, cross-site scripting, and HTTP splitting …
Bugs as deviant behavior: A general approach to inferring errors in systems code
A major obstacle to finding program errors in a real system is knowing what correctness
rules the system must obey. These rules are often undocumented or specified in an ad hoc …
rules the system must obey. These rules are often undocumented or specified in an ad hoc …
Countering code-injection attacks with instruction-set randomization
We describe a new, general approach for safeguarding systems against any type of code-
injection attack. We apply Kerckhoff's principle, by creating process-specific randomized …
injection attack. We apply Kerckhoff's principle, by creating process-specific randomized …
An empirical study of operating systems errors
We present a study of operating system errors found by automatic, static, compiler analysis
applied to the Linux and OpenBSD kernels. Our approach differs from previous studies that …
applied to the Linux and OpenBSD kernels. Our approach differs from previous studies that …