A systematic literature review of actionable alert identification techniques for automated static code analysis

S Heckman, L Williams - Information and Software Technology, 2011 - Elsevier
CONTEXT: Automated static analysis (ASA) identifies potential source code anomalies early
in the software development lifecycle that could lead to field failures. Excessive alert …

Mitigating program security vulnerabilities: Approaches and challenges

H Shahriar, M Zulkernine - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Programs are implemented in a variety of languages and contain serious vulnerabilities
which might be exploited to cause security breaches. These vulnerabilities have been …

Beacon: Directed grey-box fuzzing with provable path pruning

H Huang, Y Guo, Q Shi, P Yao, R Wu… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Unlike coverage-based fuzzing that gives equal attention to every part of a code, directed
fuzzing aims to direct a fuzzer to a specific target in the code, eg, the code with potential …

Analyzing inter-application communication in Android

E Chin, AP Felt, K Greenwood, D Wagner - Proceedings of the 9th …, 2011 - dl.acm.org
Modern smartphone operating systems support the development of third-party applications
with open system APIs. In addition to an open API, the Android operating system also …

EXE: Automatically generating inputs of death

C Cadar, V Ganesh, PM Pawlowski, DL Dill… - ACM Transactions on …, 2008 - dl.acm.org
This article presents EXE, an effective bug-finding tool that automatically generates inputs
that crash real code. Instead of running code on manually or randomly constructed input …

SoftBound: Highly compatible and complete spatial memory safety for C

S Nagarakatte, J Zhao, MMK Martin… - Proceedings of the 30th …, 2009 - dl.acm.org
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking
are well known, yet C and C++ remain in widespread use. Unfortunately, C's arbitrary …

[PDF][PDF] Finding Security Vulnerabilities in Java Applications with Static Analysis.

VB Livshits, MS Lam - USENIX security symposium, 2005 - usenix.org
This paper proposes a static analysis technique for detecting many recently discovered
application vulnerabilities such as SQL injections, cross-site scripting, and HTTP splitting …

Bugs as deviant behavior: A general approach to inferring errors in systems code

D Engler, DY Chen, S Hallem, A Chou… - ACM SIGOPS Operating …, 2001 - dl.acm.org
A major obstacle to finding program errors in a real system is knowing what correctness
rules the system must obey. These rules are often undocumented or specified in an ad hoc …

Countering code-injection attacks with instruction-set randomization

GS Kc, AD Keromytis, V Prevelakis - … of the 10th ACM conference on …, 2003 - dl.acm.org
We describe a new, general approach for safeguarding systems against any type of code-
injection attack. We apply Kerckhoff's principle, by creating process-specific randomized …

An empirical study of operating systems errors

A Chou, J Yang, B Chelf, S Hallem… - Proceedings of the …, 2001 - dl.acm.org
We present a study of operating system errors found by automatic, static, compiler analysis
applied to the Linux and OpenBSD kernels. Our approach differs from previous studies that …