Software model checking based on abstraction-refinement has recently achieved widespread success in verifying API conformance in device drivers, and we believe this success can be replicated for the problem of buffer overflow detection. This paper presents a publicly-available benchmark suite to help guide and evaluate this research. The benchmark consists of 298 code fragments of varying complexity capturing 22 buffer overflow vulnerabilities in 12 open source applications. We give a preliminary evaluation of the benchmark using the SatAbs model checker
Software model checking has become a popular tool for verifying programs' behavior. Recent resu...
A novel verification approach that combines input-code analysis and BMC techniques to detect softwar...
Buffer overflow detection using static analysis can provide a powerful tool for software programmers...
Buffer overflows are the source of a vast majority of vulnerabilities in today’s software. Existing ...
Buffer overflows are one of the most common software vulnerabilities that occur when more data is in...
Despite increased awareness and efforts to reduce buffer overflows, they continue to be the cause of...
It is interesting to know that a buffer overflow problem still exist today despite of many researche...
Abstract—Buffer overflow has become the most common software vulnerability, which seriously restrict...
Security vulnerabilities are present in most software systems, especially in projects with a large c...
Buffer overflows are common software vulnerabilities; it is possible for a program to write outside ...
Despite increasing efforts in detecting and managing soft-ware security vulnerabilities, the number ...
The vast majority of software vulnerabilities still originates from buffer overflows. Many different...
We introduce and demonstrate the viability of a novel technique for verifying that implementations o...
Buffer overflows continue to be the source of a vast majority of software vulnerabilities. Solutions...
Software model checking has become a popular tool for verifying programs ’ behavior. Recent results ...
Software model checking has become a popular tool for verifying programs' behavior. Recent resu...
A novel verification approach that combines input-code analysis and BMC techniques to detect softwar...
Buffer overflow detection using static analysis can provide a powerful tool for software programmers...
Buffer overflows are the source of a vast majority of vulnerabilities in today’s software. Existing ...
Buffer overflows are one of the most common software vulnerabilities that occur when more data is in...
Despite increased awareness and efforts to reduce buffer overflows, they continue to be the cause of...
It is interesting to know that a buffer overflow problem still exist today despite of many researche...
Abstract—Buffer overflow has become the most common software vulnerability, which seriously restrict...
Security vulnerabilities are present in most software systems, especially in projects with a large c...
Buffer overflows are common software vulnerabilities; it is possible for a program to write outside ...
Despite increasing efforts in detecting and managing soft-ware security vulnerabilities, the number ...
The vast majority of software vulnerabilities still originates from buffer overflows. Many different...
We introduce and demonstrate the viability of a novel technique for verifying that implementations o...
Buffer overflows continue to be the source of a vast majority of software vulnerabilities. Solutions...
Software model checking has become a popular tool for verifying programs ’ behavior. Recent results ...
Software model checking has become a popular tool for verifying programs' behavior. Recent resu...
A novel verification approach that combines input-code analysis and BMC techniques to detect softwar...
Buffer overflow detection using static analysis can provide a powerful tool for software programmers...