usenix conference policies
Detecting Format String Vulnerabilities with Type Qualifiers
Abstract:
We present a new system for automatically detecting format string security vulnerabilities in C programs using a constraint-based type-inference engine. We describe new techniques for presenting the results of such an analysis to the user in a form that makes bugs easier to find and to fix. The system has been implemented and tested on several real-world software packages. Our tests show that the system is very effective, detecting several bugs previously unknown to the authors and exhibiting a low rate of false positives in almost all cases. Many of our techniques are applicable to additional classes of security vulnerabilities, as well as other type- and constraint-based systems.
BibTeX
@inproceedings {270912,
author = {Umesh Shankar and Kunal Talwar and Jeffrey S. Foster and David Wagner},
title = {Detecting Format String Vulnerabilities with Type Qualifiers},
booktitle = {10th USENIX Security Symposium (USENIX Security 01)},
year = {2001},
address = {Washington, D.C.},
url = {https://www.usenix.org/conference/10th-usenix-security-symposium/detecting-format-string-vulnerabilities-type-qualifiers},
publisher = {USENIX Association},
month = aug
}
author = {Umesh Shankar and Kunal Talwar and Jeffrey S. Foster and David Wagner},
title = {Detecting Format String Vulnerabilities with Type Qualifiers},
booktitle = {10th USENIX Security Symposium (USENIX Security 01)},
year = {2001},
address = {Washington, D.C.},
url = {https://www.usenix.org/conference/10th-usenix-security-symposium/detecting-format-string-vulnerabilities-type-qualifiers},
publisher = {USENIX Association},
month = aug
}
connect with us