Memory violation detection method in binary code
In this paper memory violation detection method is considered. This method applied to program binaries, without requiring debug information. It allows to find such memory violations as out-of-bound read or writing in some buffer. The technique is based on dynamic analysis and symbolic execution. We...
Main Authors: | V. V. Kaushan, A. Y.U. Mamontov, V. A. Padaryan, A. N. Fedotov |
---|---|
Format: | Article |
Language: | English |
Published: |
Ivannikov Institute for System Programming of the Russian Academy of Sciences
2018-10-01
|
Series: | Труды Института системного программирования РАН |
Subjects: | |
Online Access: | https://ispranproceedings.elpub.ru/jour/article/view/1093 |
Similar Items
-
Automated exploit generation method for stack buffer overflow vulnerabilities
by: V. A. Padaryan, et al.
Published: (2018-10-01) -
Search method for format string vulnerabilities
by: I. A. Vakhrushev, et al.
Published: (2018-10-01) -
Buffer overrun detection method in binary code
by: V. V. Kaushan
Published: (2018-10-01) -
Software defect severity estimation in presence of modern defense mechanisms
by: A. N. Fedotov, et al.
Published: (2018-10-01) -
Method for exploitability estimation of program bugs
by: A. N. Fedotov
Published: (2018-10-01)