共 52 条
- [1] Improper validation of array index
- [2] Cowan C, Pu C, Maier D, Walpole J, Bakke P, Beattie S, Grier A, Wagle P, Zhang Q, Hinton H., Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks, Proc. of the USENIX Security Symp, 98, pp. 63-78, (1998)
- [3] Ye T, Zhang L, Wang L, Li X., An empirical study on detecting and fixing buffer overflow bugs, Proc. of the IEEE Int'l Conf. on Software Testing, Verification and Validation (ICST), pp. 91-101, (2016)
- [4] Gao F, Wang L, Li X., BovInspector: Automatic inspection and repair of buffer overflow vulnerabilities, Proc. of the 31st IEEE/ACM Int'l Conf. on Automated Software Engineering (ASE), pp. 786-791, (2016)
- [5] Bao T, Gao F, Zhou Y, Li Y, Wang L, Li X., Automatically validating static buffer overflow warnings based on guided symbolic execution, Journal of Cyber Security, 2, pp. 46-60, (2016)
- [6] Wang L, Li F, Li L, Feng XB., Principle and practice of taint analysis, Ruan Jian Xue Bao/Journal of Software, 28, 4, pp. 860-882, (2017)
- [7] Chimdyalwar B., Survey of array out of bound access checkers for C code, Proc. of the 5th India Software Engineering Conf. ACM, pp. 45-48, (2012)
- [8] Ming J, Wu D, Xiao G, Wang J, Liu P., TaintPipe: Pipelined symbolic taint analysis, Proc. of the 24th {USENIX} Security Symp. ({USENIX} Security 15), pp. 65-80, (2015)
- [9] Newsome J, Song DX., Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, Proc. of the Network and Distributed System Security Symp. (NDSS), 5, pp. 3-4, (2005)
- [10] Khedker U, Sanyal A, Sathe B., Data Flow Analysis: Theory and Practice, (2009)