Statically detecting buffer overflows in C/C++
The paper describes a static analysis approach for buffer overflow detection in C/C++ source code. This algorithm is designed to be path-sensitive as it is based on symbolic execution with state merging. For now, it works only with buffers on stack or on static memory with compile-time known size. W...
Main Authors: | I. . Dudina, V. . Koshelev, A. . Borodin |
---|---|
Format: | Article |
Language: | English |
Published: |
Ivannikov Institute for System Programming of the Russian Academy of Sciences
2018-10-01
|
Series: | Труды Института системного программирования РАН |
Subjects: | |
Online Access: | https://ispranproceedings.elpub.ru/jour/article/view/144 |
Similar Items
-
Inter-procedural buffer overflows detection in C/C++ source code via static analysis
by: I. . Dudina
Published: (2018-10-01) -
Path-sensitive bug detection analysis of C# program illustrated by null pointer dereference
by: V. . Koshelev, et al.
Published: (2018-10-01) -
C# static analysis framework
by: V. . Koshelev, et al.
Published: (2018-10-01) -
Buffer Overflow Detection via Static Analysis: Expectations vs. Reality
by: I. A. Dudina
Published: (2018-10-01) -
An approach to the C string analysis for buffer overflow detection
by: I. A. Dudina, et al.
Published: (2018-12-01)