International audienceThe C programming language does not prevent out-of- bounds memory accesses. There exist several techniques to secure C programs; however, these methods tend to slow down these programs substantially, because they populate the binary code with runtime checks. To deal with this prob- lem, we have designed and tested two static analyses - sym- bolic region and range analysis - which we combine to re- move the majority of these guards. In addition to the analy- ses themselves, we bring two other contributions. First, we describe live range splitting strategies that improve the effi- ciency and the precision of our analyses. Secondly, we show how to deal with integer overflows, a phenomenon that can compromise the correctne...
International audienceAbstract interpretation provides advanced techniques to infer numerical invari...
Programs written in C and C++ are susceptible to a number of memory errors, including buffer overflo...
International audienceThis paper deals with the binary analysis of executable programs, with the goa...
International audienceThe C programming language does not prevent out-of- bounds memory accesses. Th...
Memory safety violations such as buffer overflows are a threat to security to this day. A common sol...
Static analysis of programs in weakly typed languages such as C and C++ generally is not guaranteed ...
We check statically whether it is safe for untrusted foreign machine code to be loaded into a truste...
C is the most widely used imperative system's implementation language. While C provides types and hi...
Memory errors such as buffer overruns are notorious security vulnerabilities. There has been conside...
Memory-safe execution of C programs has been well researched but the ability to find memory-safety v...
Buffer overflows are still a significant problem in programs written in C and C++. In this paper we ...
Memory access violations are a leading source of unreliability in C programs. Although the low-leve...
International audienceAn important concern addressed by runtime verification tools for C code is rel...
International audienceMotivated by applications to security and high efficiency , we propose an auto...
While automated verification of imperative programs has been studied intensively, proving terminatio...
International audienceAbstract interpretation provides advanced techniques to infer numerical invari...
Programs written in C and C++ are susceptible to a number of memory errors, including buffer overflo...
International audienceThis paper deals with the binary analysis of executable programs, with the goa...
International audienceThe C programming language does not prevent out-of- bounds memory accesses. Th...
Memory safety violations such as buffer overflows are a threat to security to this day. A common sol...
Static analysis of programs in weakly typed languages such as C and C++ generally is not guaranteed ...
We check statically whether it is safe for untrusted foreign machine code to be loaded into a truste...
C is the most widely used imperative system's implementation language. While C provides types and hi...
Memory errors such as buffer overruns are notorious security vulnerabilities. There has been conside...
Memory-safe execution of C programs has been well researched but the ability to find memory-safety v...
Buffer overflows are still a significant problem in programs written in C and C++. In this paper we ...
Memory access violations are a leading source of unreliability in C programs. Although the low-leve...
International audienceAn important concern addressed by runtime verification tools for C code is rel...
International audienceMotivated by applications to security and high efficiency , we propose an auto...
While automated verification of imperative programs has been studied intensively, proving terminatio...
International audienceAbstract interpretation provides advanced techniques to infer numerical invari...
Programs written in C and C++ are susceptible to a number of memory errors, including buffer overflo...
International audienceThis paper deals with the binary analysis of executable programs, with the goa...